[英]How to create a proxy that can decode SSL traffic?
我正在編寫一個可以捕獲我的selenium測試中發出的請求的代理。 在硒中我使用了這個
host = '10.203.9.156'
profile = webdriver.FirefoxProfile()
myProxy = "localhost:8899"
proxy = Proxy({
'proxyType': ProxyType.MANUAL,
'httpProxy': myProxy,
'ftpProxy': myProxy,
'sslProxy': myProxy,
'noProxy': '' # set this value as desired
})
driver = webdriver.Firefox(proxy=proxy)
接受客戶端請求的代理部分
self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
###
ssl.wrap_socket(self.socket, ssl_version=ssl.PROTOCOL_TLSv1, keyfile = ??, certfile = ???, server_side=True)
###
self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
self.socket.bind((self.hostname, self.port))
self.socket.listen(self.backlog)
while True:
conn, addr = self.socket.accept()
logger.debug('Accepted connection %r at address %r' % (conn, addr))
self.handle(conn,addr)
這是與服務器建立連接的部分
self.conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
###
ssl.wrap_socket(self.socket, ssl_version=ssl.PROTOCOL_TLSv1, keyfile = ??, certfile = ???, server_side=True)
###
self.conn.connect((self.addr[0], self.addr[1]))
我可以訪問服務器。 我的問題是,客戶端請求接受部分應該是什么部分,並將其轉發到服務器,在###之間,這將允許我以人類可讀的格式捕獲流量? 證書不是很好。 歡迎任何幫助。
樣板
SSL是一種在兩方之間提供端到端加密通信的協議,每個方都具有私鑰/公鑰對中的一個密鑰。 通常是瀏覽器和Web服務器。
在正常情況下,兩個端點之間的任何設備都無法解密通信。
但是,可以使用代理服務器對通信進行解密和重新加密,從而允許攔截和解密,這是您的情況。 但是,它需要將額外的證書添加到客戶端計算機上的受信任證書存儲區(通過軟件管理系統自動添加或由用戶手動添加)。
解決你的問題
總的來說,您正在創建“中間人”類型代理,這意味着傳遞給代理服務器的每個請求都應該被解密並再次加密,而客戶端應該具有匹配的SSL私鑰。 嘗試使用mitmproxy / libmproxy庫。
查看可能的proxy.py解決方案:
#!/usr/bin/env python
# -*- encoding: utf-8 -*-
from libmproxy import controller, proxy
import os, sys, re, datetime, json
class RequestHacks:
@staticmethod
def example_com (msg):
# tamper outgoing requests for https://example.com/api/v2
if ('example.org' in msg.host) and ('action=login' in msg.content):
fake_lat, fake_lng = 25.0333, 121.5333
tampered = re.sub('lat=([\d.]+)&lng=([\d.]+)', 'lat=%s&lng=%s' % (fake_lat, fake_lng), msg.content)
msg.content = tampered
print '[RequestHacks][Example.com] Fake location (%s, %s) sent when logging in' % (fake_lat, fake_lng)
class ResponseHacks:
@staticmethod
def example_org (msg):
# simple substitution for https://example.org/api/users/:id.json
if 'example.org' in msg.request.host:
regex = re.compile('/api/users/(\d+).json')
match = regex.search(msg.request.path)
if match and msg.content:
c = msg.replace(''private_data_accessible':false', ''private_data_accessible':true')
if c > 0:
user_id = match.groups()[0]
print '[ResponseHacks][Example.org] Private info of user #%s revealed' % user_id
@staticmethod
def example_com (msg):
# JSON manipulation for https://example.com/api/v2
if ('example.com' in msg.request.host) and ('action=user_profile' in msg.request.content):
msg.decode() # need to decode the message first
data = json.loads(msg.content) # parse JSON with decompressed content
data['access_granted'] = true
msg.content = json.dumps(data) # write back our changes
print '[ResponseHacks][Example.com] Access granted of user profile #%s' % data['id']
@staticmethod
def example_net (msg):
# Response inspection for https://example.net
if 'example.net' in msg.request.host:
data = msg.get_decoded_content() # read decompressed content without modifying msg
print '[ResponseHacks][Example.net] Respones: %s' % data
class InterceptingMaster (controller.Master):
def __init__ (self, server):
controller.Master.__init__(self, server)
def run (self):
while True:
try:
controller.Master.run(self)
except KeyboardInterrupt:
print 'KeyboardInterrupt received. Shutting down'
self.shutdown()
sys.exit(0)
except Exception:
print 'Exception catched. Intercepting proxy restarted'
pass
def handle_request (self, msg):
timestamp = datetime.datetime.today().strftime('%Y/%m/%d %H:%M:%S')
client_ip = msg.client_conn.address[0]
request_url = '%s://%s%s' % (msg.scheme, .msg.host, msg.path)
print '[%s %s] %s %s' % (timestamp, client_ip, msg.method, request_url)
RequestHacks.example_com(msg)
msg.reply()
def handle_response (self, msg):
ResponseHacks.example_org(msg)
ResponseHacks.example_com(msg)
ResponseHacks.example_net(msg)
msg.reply()
def main (argv):
config = proxy.ProxyConfig(
cacert = os.path.expanduser('./mitmproxy.pem'),
)
server = proxy.ProxyServer(config, 8080)
print 'Intercepting Proxy listening on 8080'
m = InterceptingMaster(server)
m.run()
if __name__ == '__main__':
main(sys.argv)
聲明:本站的技術帖子網頁,遵循CC BY-SA 4.0協議,如果您需要轉載,請注明本站網址或者原文地址。任何問題請咨詢:yoyou2525@163.com.