π₯ Capturing HTTPS Traffic and Viewing it in PLAIN TEXT with MITMProxy π₯
Thank you so much for watching! π¨βπ» π§ Today I'm showing you probably the best way today to capture HTTPS traffic and see EVERYTHING in plain text (decrypted). π§ The method isn't flawless, but is very close to perfection and definitely amazing. I use it for malware analysis and so can you (or for your redteam ops). ππ» Visit my website for more : https://hoxframework.com.hr/?p=534 (transcript) ππ» Or join my Discord (https://discord.gg/B3mBXfZSwr), ππ» or contact me on Instagram (https://www.instagram.com/hoxframework/). Huge thanks on 3k subs !!! π«ΆπΌ Stay tuned for more. If you have video ideas let me know! π¨π½βπ TIMELINE: 0:00 2:05 - Preparing for the Attack-execution 2:06 4:32 - Attack-execution (MITMPROXY) 4:33 5:00 - Wrap up π₯ DISCLAIMER: THIS VIDEO IS FOR EDUCATIONAL PURPOSES. I DO NOT SUPPORT ANY ILLEGAL ACTIVITY. EVERYTHING DONE IN THE VIDEO IS DONE IN AN ISOLATED ENVIRONMENT THAT I OWN AND PERMIT MYSELF TO USE. I DO NOT SUPPORT SPREADING OF ILLEGAL INFO OR CAPTURING INFORMATION. PLEASE STAY LEGAL AND SAFE ONLINE. MITMPROXY SHOULD NEVER BE USED FOR ILLEGAL PURPOSES AND I DONT SUPPORT ANY. MITMPROXY IS FOR USAGES LIKE MALWARE ANALYSIS TO CAPTURE MALICIOUS TRAFFIC, OR TO DEBUG OUR OWN SOFTWARE EXCLUSIVELY. π₯ TAGS: proxy, mitmproxy, testing environment, malware analysis, capturing malware traffic, blue team, defending, blueteam defense, cybersecurity, internetsafety, certificates, kali linux, easy, simple, tutorial, hoxframework, hox
Download
0 formatsNo download links available.