aboutsummaryrefslogtreecommitdiffstats
path: root/doc-src/faq.html
blob: 769227bd7b35dff2e68b97aa321a58ef5f1ce400 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
<div class="faq">

    <p class="question">Any tips for running mitmproxy on OSX?</p>

    Coming soon.

    <p class="question">I'm pentesting an non-browser app that checks SSL
    certificate validity. How do I make it trust the MITMProxy certificate?</p>


    <p> Here's a quick and easy procedure you can use for Windows 7, as long as
    the app in question uses the global Windows certificate repository. </p>

    <ul>

        <li> First copy the file <b>libmproxy/resources/bogus_template</b>
        from the MITMProxy source, and edit it to include your target domain in
        the CN parameter. The result should look like this:

<pre>[ req ]
prompt = no
distinguished_name = req_distinguished_name

[ req_distinguished_name ]
C               = NZ
ST              = none
L               = none
O               = none
OU              = none
CN              = target.domain.com
emailAddress    = none</pre>
        </li>

        <li> Next, use your bogus template to generate a certificate, and
        install it for MITMPRoxy to use:

<pre>openssl req -config ./my_bogus_template -x509 -nodes -days 9999 -newkey rsa:1024 -keyout mycert -out mycert

cp mycert ~/.mitmproxy/cert.pem</pre>
        </li>

        <li> Fire up MITMProxy, and configure Firefox on the Windows box to use
        it. Browse to the target domain, and you should see a big warning about
        an untrusted certificate. Use Firefox to export the certificate ("Add
        Exception", "Get Certificate", then "View", tab to "Details" and click
        "Export").  </li>

        <li> From the command console, fire up <b>certmgr</b>. Select "Trusted
        Root Certification Authorities", then on the top menu, "Action", "All
        Tasks", and "Import". When prompted, select the certificate file you've
        just saved from Firefox.</li>

        <li> And that's it - your certificate should now be trusted for that
        domain. Happy pentesting.</li>

    </ul>

</div>