-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Record and re-use TLS profiles #6
Comments
From what I read, the main change happens here: saucesteals/goproxy@804168e#diff-9eb708469ebd17cf090b3e0e1a04c074850beb22e94ea3d327ad0610ec7bad32
I think I can simply record the ClientHello into a file and fingerprint it again and again at runtime. TODO
|
Managed to make it work!I managed to make everything work. My testing command: curl -k --proxy localhost:8080 https://tls.peet.ws/api/tls | jq .tls.peetprint_hash I first set my computer's global proxy to UTLSProxy and directed Safari to a website. I then relaunched with an environment variable that overwrites the ClientHello, pointed to the one I saved. Next step
|
I will leave this PR open to discuss ClientHello reuse and open a new one concerning upstream proxies. |
I am looking to inspect an HTTPS flow with Mitmproxy without altering the TLS fingerprint.
So, I am looking for this kind of setup:
Android device --> Mitmproxy --> proxychains(utlsproxy)
I will document my findings here.
The text was updated successfully, but these errors were encountered: