Open LeosSire opened 1 year ago
The listening program should return the packets back to sslproxy on the server side. For example, in your sample output above, your Python script should start a connection to [127.0.0.1]:45101 and give that packet back to sslproxy listening at that address. Also, it should keep that connection open, because sslproxy will send the server responses back to your Python script over that same address. (I don't see your script doing any parsing of the SSLproxy line or starting such connections.) Note that you can find a sample listening program here.
Good afternoon Sonertari, I have been looking at lp and its awesome, I'm trying to access the content of each page (I believe this is called ctx->file
when logging.
Then I log to files -L option
the content appears to be encrypted. Is this correct? Event for simple a simple GET which should return html, it returns this.
Why am I seeing this? It appears to be encrypted. There are some svg's in separate files which are decoded. But I didn't check they may have been http (no s).
I guess they are compressed. See "content-encoding: gzip" on your screenshot?
Big fan of your's and Roe's work.
For the benefit of understanding and clarification I have put together a cheeky little python script for inspecting the traffic and how a listener should work. It's receiving headers great, but the response never seems to receive and clients report connection issues.
I've scoured your readme and the below should work. If you could shed some light from an education purpose it would be greatly appreciated.
Using Linux Mint server as an AP.
Running SSLsplit with command:
sudo sslproxy -k ./certs/ca.key -c ./certs/ca.crt -P ssl 0.0.0.0 8443 up:8080
When running withhttps
command results in consistent HelloConnect errors. :-(IPTables rules:
Python script:
Example responses: Python listener:
SSLproxy: