首页 > 其他分享 >mitmproxy

mitmproxy

时间:2024-01-17 23:32:43浏览次数:22  
标签:http request 22% flow mitmproxy 5C% 2C%

mitmproxy是一个代理工具(软件安装 或 Python模块安装),实现代理请求(拦截请求或修改请求)

这里介绍python的模块使用

这里强烈推荐这个安装第三方库的软件:

链接:https://pan.baidu.com/s/1L56TY68VNrw54go8eTxjkg?pwd=pg22

提取码:pg22

pip install mitmproxy

基本就没有报错了。

启动

启动mitmproxy,去本地用户目录中寻找证书。

mitmdump -q  -p 8888 -s v1.py
from mitmproxy import http
from mitmproxy.http import Request


def request(flow: http.HTTPFlow):
    print("请求->", flow.request.url)


def response(flow: http.HTTPFlow):
    pass

效果:

mitmproxy_字段

获取证书

在电脑 C:\Users\admin\.mitmproxy 中去获取。admin是我的账户名

mitmproxy_字段_02

mitmproxy_2d_03

mitmproxy_5e_04

mitmproxy_5e_05

mitmproxy_字段_06

mitmproxy_2d_07

配置代理


mitmproxy_字段_08

请求

读取

from mitmproxy import http
from mitmproxy.http import Request


def request(flow):
    print("请求-->", flow.request.url)
    print("请求-->", flow.request.host)
    print("请求-->", flow.request.path)
    print("请求-->", flow.request.query)
    print("请求-->", flow.request.cookies)
    print("请求-->", flow.request.headers)
    print("请求-->", flow.request.method)
    print("请求-->", flow.request.content)


def response(flow: http.HTTPFlow):
    pass

mitmproxy_5e_09

修改:

from mitmproxy import http
from mitmproxy.http import Request
from mitmproxy.http import HTTPFlow


def request(flow: HTTPFlow):
    flow.request.url = "https://movie.douban.com/j/search_subjects?type=movie&tag=%E7%83%AD%E9%97%A8&sort=recommend&page_limit=20&page_start=20"


def response(flow: http.HTTPFlow):
    pass
mitmdump -q  -p 8888 -s v2.py

mitmproxy_2d_10

返回结果:

from mitmproxy import http
from mitmproxy.http import Request
from mitmproxy.http import HTTPFlow
from mitmproxy.http import Response


def request(flow: HTTPFlow):
    if flow.request.url.startswith("https://dig.chouti.com/"):
        flow.response = Response.make(
            200,  # (optional) status code
            b"Hello World",  # (optional) content
            {"Content-Type": "text/html"}  # (optional) headers
        )


def response(flow: http.HTTPFlow):
    pass

# mitmdump -q  -p 8888 -s v1.py

mitmproxy_字段_11

共享vip的原理

获取已经登录的用户cookie,利用这个软件,把cookie复制给其他用户使用。

可能还会校验其他字段,我这里没测试。辛辛苦苦改了这么多字段。

这里我随便找了个网站登录:

from mitmproxy import http
from mitmproxy.http import Request
from mitmproxy.http import HTTPFlow


def request(flow: HTTPFlow):
    print(flow.request.url)
    flow.request.cookies = [
        ('bt_guid', '%223fdd01a4efcf1d5689d0c42087a10669%22'),
        ('from_url', '360'),
        ('is_sem_chan', '1'),
        ('26526d84a1514f6a4bf6aab55685074d', '%220a35a8a8059a99fb4f9570dd8c0a57c7%22'),
        ('issem', '1'),
        ('semword', '%E6%9C%AA%E6%A0%87%E8%AE%B0'),
        ('host', 'cn.bing.com'),
        ('source_url', '360_tuiguang'),
        ('no_login_pv', '1'),
        ('588KUSSID', '2ekpob3v2pl9l7g1cffgoeh7k2'),
        ('ocpc', 'https%3A%2F%2F588ku.com%2Fso%2F%3Fh%3D360%26sem%3D1%26kw%3Dqs0009503%26guanggao%26qhclickid%3D179762ef0361158b'),
        ('_k_iprec_1', '218.89.183.7'),
        ('_k_iprec_wd_1', '%7C-'),
        ('_k_iprec_kw_1', 'qs0009503'),
        ('_k_ut_v1', '%22%7B%5C%22ip%5C%22%3A%5C%22218.89.183.7%5C%22%2C%5C%22d%5C%22%3A%5C%222024-01-12%5C%22%2C%5C%22h%5C%22%3A%5C%22360%5C%22%2C%5C%22hd%5C%22%3A%5C%22%5C%22%2C%5C%22sem%5C%22%3A%5C%221%5C%22%2C%5C%22host%5C%22%3A%5C%22cn.bing.com%5C%22%2C%5C%22bm%5C%22%3A8258%2C%5C%22kw%5C%22%3A%5C%22qs0009503%5C%22%7D%22'),
        ('Hm_lvt_3e90322e8debb1d06c9c463f41ea984b', '1705051593'),
        ('user_sem_source', '1'),
        ('699pic_popup_lock', '1'),
        ('user_source', 'sem'),
        ('Hm_lvt_8226f7457e3273fa68c31fdc4ebf62ff', '1705051593'),
        ('referer', '%22http%3A%5C%2F%5C%2F588ku.com%5C%2F%3Fm%3DAdvertising%26a%3DgetAdvertising%22'),
        ('FIRSTVISITED', '1705051593.283'),
        ('qka.ref-qkm', '{%22r_qkm%22:%220.0.0.0.0%22%2C%22r_url%22:%22https://588ku.com/so/?h=360&sem=1&kw=qs0009503&guanggao&qhclickid=179762ef0361158b%22%2C%22r_ref%22:%22https://cn.bing.com/%22%2C%22r_ref_kw%22:%22%22%2C%22r_bd_vid%22:%22%22}'),
        ('qka.session-id', 'e949a82d-127d-46b8-a67e-605b393badbd'),
        ('qka.session-is-day', '1'),
        ('588ku_login_refer_url', 'https%3A//588ku.com/so/%3Fh%3D360%26sem%3D1%26kw%3Dqs0009503%26guanggao%26qhclickid%3D179762ef0361158b'),
        ('temp_login_uid', '42851994'),
        ('temp_login_avator', '%22https%3A%5C%2F%5C%2Fthirdwx.qlogo.cn%5C%2Fmmopen%5C%2Fvi_32%5C%2F7KbDZ2Y8Nc0xNiadHnQQw0xuibmqQUulzAj4RmhV5OHFDW4Hlyk8DePN2gC5fO2kfjic9RYr7CxpuoVVfQOMGQxtO8sDXicqhMkCc9Y52175mwI%5C%2F132%22'),
        ('temp_login_flag2', '1'),
        ('auth_id', '%2242851994%7C%5Cu6c99%5Cu6f20%5Cu91cc%5Cu7684%5Cu6708%5Cu4eae%7C1705915618%7Cb9e5966cf0446ca56d3bae32857471c8%22'),
        ('sns', '%7B%22token%22%3A%7B%22access_token%22%3A%2276_Dlng_R3DOoRIsboQttgWg_O8rX_wu0_4HfbqA44Uj-23-gJ91j9WkzCZx9U705tarrNQQOrVj-iaD5u3yXK79mlVKZsHsmSsFyOtoF0TCEI%22%2C%22expires_in%22%3A7200%2C%22refresh_token%22%3A%2276_KSJsKagOTgFzR35Jihwxn_Zd6NLC4lGruloHuqBJevmaBz2nFPJrI5t5Q4H8W3iMLsg9adRt27ouV5egxNufdmNwkn7gDmKdqNDk6zIssiQ%22%2C%22openid%22%3A%22oH595wO-cTXAdunrY35QdYPmvYVY%22%2C%22scope%22%3A%22snsapi_login%22%2C%22unionid%22%3A%22oe6yuwzppL8fiafQUbocJ9IUaSGA%22%7D%2C%22type%22%3A%22weixin%22%7D'),
        ('last_login_type', '2'),
        ('qka.last-from', '{%22url%22:%22https://588ku.com/so/?h=360&sem=1&kw=qs0009503&guanggao&qhclickid=179762ef0361158b%22%2C%22ref%22:%22https://open.weixin.qq.com/%22%2C%22bd_vid%22:%22%22}'),
        ('ISREQUEST', '1'),
        ('WEBPARAMS', 'is_pay=0'),
        ('adIssem', '0'),
        ('qk_host', '588ku.com'),
        ('location', '6'),
        ('_qkm_841a5ea6b26b6b62b7102bfdc907164b', '0.0.0.0.51192dcbEVY3vl'),
        ('login_pv', '3'),
        ('write_phone_pv', '3'),
        ( 'Hm_lpvt_3e90322e8debb1d06c9c463f41ea984b', '1705051628'),
        ('Hm_lpvt_8226f7457e3273fa68c31fdc4ebf62ff', '1705051628'),
    ]


def response(flow: http.HTTPFlow):
    pass

# mitmdump -q  -p 8888 -s v1.py

mitmproxy_5e_12

mitmproxy_5e_13

标签:http,request,22%,flow,mitmproxy,5C%,2C%
From: https://blog.51cto.com/u_16172166/9298651

相关文章

  • 接口自动化&抓包&代理神器-Mitmproxy代理配置详细教程
    Mitmproxy代理配置及接口加解密详细教程官方网站:EventHooks&API(mitmproxy.org)本节目录展示:文章目录Mitmproxy代理配置及接口加解密详细教程客户端下载安装证书mitmproxy代理ios设备启动服务ios设备配置代理使用web抓取代码过滤处理加解密字符替换字符串转二进制字符串转字节......
  • 代理工具 Mitmproxy(二)
    这一节教大家编写Mitmproxy自定义脚本,这才是Mitmproxy真正强大的在方。Mitmproxy官方给了很多例子:https://docs.mitmproxy.org/stable/addons-examples/我们演示一个简单的例子http-add-header.py,为每一个response中增一个数字,标明是当前是第几个请求。"""AddanHTTPhead......
  • 代理工具 Mitmproxy (一)
    你在用哪款代理/抓包工具?你可能会回答fiddler,charles等HTTP/HTTPS抓包工具,或者是网卡级的wireshark工具。这里再推荐一款代理工具mitmproxy,前些天公司项目中有用到,这里做个简单的介绍。mitmproxy是一个免费开源的交互式HTTPS代理。github地址:https://github.com/mitmproxy/m......
  • mitmproxy从入门到放弃
    mitmproxy是一款常用的抓包工具。和其他抓包工具相比,不仅可以抓包还可以对包进行2次过滤并且伪装请求与python进行交互,相比fiddler和burp更为灵活。本文让我们一起来学习他的使用吧。mitmproxy工作原理特性拦截HTTP和HTTPS请求和响应并即时修改它们;保存完整的HTTP对话以供以......
  • mitmproxy初探(windows版以及linux版)
    mitmproxy简介mitmproxy是一组工具,包括:mitmproxy(交互式的,具有控制台界面,但不支持windows)mitmweb(基于web的图形化界面)mitmdump(命令行版本)win10安装mitmproxy查阅了官方文档以及各位大佬博客,基本上都是在python环境下安装的,但是python版本好像要高于3.6,我就试了一下直接用pip......
  • Mitmproxy 常规功能介绍
    背景mitmproxy是一个开源的中间人代理工具,用于拦截、修改和观察HTTP/HTTPS流量,并支持扩展功能。它包含三个功能模块:mitmproxy、mitmweb和mitmdump,每个模块提供不同的界面和功能。mitmproxy:提供命令行界面,使用命令行进行操作和监控。mitmweb:提供浏览器界面,通过Web界面进行操作......
  • python mitmproxy抓包库
    一.简介mitmproxy是一款用Python编写的支持HTTP(S)的中间人代理工具。它可以拦截、查看、修改、重放和保存HTTP/HTTPS流量,支持命令行界面和图形界面,可用于安全测试、网络调试、API开发和反向工程等场景。mitmproxy具有很高的灵活性和扩展性,可以通过插件机制进行定制化开发和功能......
  • 用Fiddler、Charles和mitmproxy进行手机抓包的配置教程
    [用Fiddler、Charles和mitmproxy进行手机抓包的配置教程_程序员大飞1的博客-CSDN博客](https://blog.csdn.net/weixin_42512684/article/details/93534803)写爬虫时,有些数据pc端并不能提供我们需要的数据例如抖音,就需要对手机端数据进行抓取,目前来说比较常用的app抓包软件:Fidd......
  • mitmproxy
    mitmproxy介绍、特征、工具以及示例–pytorch中文网(ptorch.com)1、介绍mitmproxy是一个python的项目,可以实现为HTTP/1,HTTP/2和WebSockets提供交互式的,具有SSL/TLS功能的拦截代理。基于pip进行安装,然后可以提供三种形式的服务:mitmproxy是具有SSL/TLS功能的交互式拦截侦听......
  • mitmproxy代理抓包、拦截信息
    1、代理安装配置:1.1、方式一:客户端地址:https://mitmproxy.org/downloads/1.2、方式二:Python库pipinstallmitmproxy2、证书安装安装成功后进入C:\Users\admin\.......