![]() If you hit “e” while on the request tab, you’ll be prompted to select an item to edit. If you hit “r” at any time in this view, you’ll see the times refresh, as this will replay the request. Hit “e” on a request to be prompted to save a request externally, or hit “enter”, and you’ll be able to view more details.įrom the detailed view, hit the left or right arrows to cycle through the different detailed tab views, and use the up and down arrows to scroll through the data. ![]() Switch to the mitmproxy window (indicated with hot-pink in the screenshot), and use the up and down keys to select a request. You should now have a view like this, where mitmproxy is the top window, and the bottom window is used for general console actions: Image 1: Split terminal view with mitmproxy above and a console window below Hit “up” on the keyboard and enter a couple of times, to repeat the curl command and populate more data. In the bottom window which we’ll use to run console commands, let’s start with a non-encrypted HTTP call, to keep things simple. In the top window which we’ll use for the proxy, launch mitmproxy: You can switch between windows by hitting “ctrl + b” again, and using the up or down arrow keys. This opens a new “window” within the terminal. Hit “ctrl + b” (or “cmd + b” on Mac), release the keys, then hit `”`. We’ve installed tmux so we can manage mitmproxy in one virtual terminal, and work with curl or code in the other.įirst simple run ‘tmux’. You’ll now be running in a clean, isolated instance of ubuntu.įrom here, let’s install a few dependencies we’ll need. ![]() In a terminal window, pull and launch an ubuntu image like so: Using a Capture Proxy in Dockerįirst, install Docker if you haven’t already. To avoid these kinds of differences, we’re going to use mitmproxy’s terminal UI in a docker image. ![]() While this may sound straightforward, setup can vary between languages, libraries, operating systems, and even web browsers. (2) Tell it to trust the proxy’s Certificate Authority (CA) There are two steps to configuring an application to use a capture proxy. In this tutorial, we’ll walk through configuring a capture proxy and using some basic features. We discussed the basics of how these tools operate, and showed several examples of different capture proxy tools, to demonstrate how they can be targeted for different use cases. In our previous article, “API Debugging with Capture Proxies”, we explored what a capture proxy was, and how it can be an incredibly useful tool for developers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |