Intercept SSL Traffic

From WebOS Internals
Revision as of 06:04, 27 March 2011 by RodWhitby (talk | contribs) (Created page with "Run Internet Sharing on your host, gateway address is 10.0.2.1, client wifi address is 10.0.2.x Install burpsuite (must be run as root) Assumes you want to intercept traffic to...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Run Internet Sharing on your host, gateway address is 10.0.2.1, client wifi address is 10.0.2.x

Install burpsuite (must be run as root)

Assumes you want to intercept traffic to <target-host>:<target-port>

Create a new proxy:

local listener port: 443 listen on loopback interface only: no support invisible proxying for non-proxy-aware clients: yes redirect to host: <target-host> redirect to port: <target-port> generate a CA-signed certification with a specific hostname: <target-host>

intercept client requests: intercept-if: yes update Content-Length: yes

intercept server responses: intercept-if: yes update Content-Length: yes

unpack gzip / deflate: yes

On the device:

Edit /etc/hosts 10.0.2.1 <target-host>