mitmproxy/examples/complex/tcp_message.py

29 lines
950 B
Python
Raw Normal View History

2016-06-14 01:17:09 +00:00
"""
2016-01-02 15:00:27 +00:00
tcp_message Inline Script Hook API Demonstration
------------------------------------------------
* modifies packets containing "foo" to "bar"
* prints various details for each packet.
example cmdline invocation:
mitmdump -T --host --tcp ".*" -q -s examples/tcp_message.py
2016-06-14 01:17:09 +00:00
"""
from mitmproxy.utils import strutils
from mitmproxy import ctx
2016-01-02 15:00:27 +00:00
2016-05-29 08:23:39 +00:00
2016-07-08 01:37:33 +00:00
def tcp_message(tcp_msg):
2016-01-02 15:00:27 +00:00
modified_msg = tcp_msg.message.replace("foo", "bar")
is_modified = False if modified_msg == tcp_msg.message else True
tcp_msg.message = modified_msg
ctx.log.info(
"[tcp_message{}] from {} {} to {} {}:\r\n{}".format(
" (modified)" if is_modified else "",
"client" if tcp_msg.sender == tcp_msg.client_conn else "server",
tcp_msg.sender.address,
"server" if tcp_msg.receiver == tcp_msg.server_conn else "client",
tcp_msg.receiver.address, strutils.bytes_to_escaped_str(tcp_msg.message))
)