mirror of
https://github.com/Grasscutters/mitmproxy.git
synced 2024-11-26 10:16:27 +00:00
Docs.
Add screenshots and an explanation of interception.
This commit is contained in:
parent
3120b5ce15
commit
6d4bb1faeb
@ -37,6 +37,8 @@ Requirements
|
||||
[urwid](http://excess.org/urwid/) library.
|
||||
* The test suite uses the [pry](http://github.com/cortesi/pry) unit testing
|
||||
library.
|
||||
* mitmproxy is tested and developed on OSX, Linux and OpenBSD. You may be able
|
||||
to get it running using Cygwin on Windows, but don't count on it.
|
||||
|
||||
You should also make sure that your console environment is set up with the
|
||||
following:
|
||||
|
@ -1,6 +1,7 @@
|
||||
|
||||
|
||||
* [Introduction](@!urlTo("intro.html")!@)
|
||||
* [Interception](@!urlTo("interception.html")!@)
|
||||
* [Client-side replay](@!urlTo("clientreplay.html")!@)
|
||||
* [Server-side replay](@!urlTo("serverreplay.html")!@)
|
||||
* [Sticky cookies](@!urlTo("stickycookies.html")!@)
|
||||
|
@ -56,6 +56,7 @@ ns.filt_help = filt_help
|
||||
pages = [
|
||||
Page("index.html", "Index"),
|
||||
Page("intro.html", "Introduction"),
|
||||
Page("interception.html", "Interception"),
|
||||
Page("clientreplay.html", "Client-side replay"),
|
||||
Page("serverreplay.html", "Server-side replay"),
|
||||
Page("stickycookies.html", "Sticky cookies"),
|
||||
|
38
doc-src/interception.html
Normal file
38
doc-src/interception.html
Normal file
@ -0,0 +1,38 @@
|
||||
|
||||
__mitmproxy__'s interception functionality lets you pause an HTTP request or
|
||||
response, inspect and modify it, and then accept it to send it on to the server
|
||||
or client. Because this is an interactive function, it's only present in
|
||||
__mitmproxy__, not in __mitmdump__.
|
||||
|
||||
|
||||
### 1: Set an interception pattern
|
||||
|
||||
<img src="@!urlTo('intercept-filt.png')!@"/>
|
||||
|
||||
We press __i__ to set an interception pattern. In this case, the __~q__ filter
|
||||
pattern tells __mitmproxy__ to intercept all requests. For complete filter
|
||||
syntax, see the [Filter expressions](@!urlTo("filters.html")!@) section of this
|
||||
document, or the built-in help function in __mitmproxy__.
|
||||
|
||||
### 2: Intercepted conenctions are indicated with a red exclamation mark:
|
||||
|
||||
<img src="@!urlTo('intercept-mid.png')!@"/>
|
||||
|
||||
### 3: You can now view and modify the request:
|
||||
|
||||
<img src="@!urlTo('intercept-options.png')!@"/>
|
||||
|
||||
In this case, we viewd the request by selecting it, pressed __e__ for "edit"
|
||||
and __m__ for "method" to change the HTTP request method.
|
||||
|
||||
### 4: Accept the intercept to continue
|
||||
|
||||
<img src="@!urlTo('intercept-result.png')!@"/>
|
||||
|
||||
Finally, we press __a__ to accept the modified request, which is then sent on
|
||||
to the server. In this case, we changed the request from an HTTP GET to to
|
||||
OPTIONS, and Google's server has responded with a 405 "Method not allowed".
|
||||
|
||||
|
||||
|
||||
|
BIN
doc-src/screenshots/intercept-filt.png
Normal file
BIN
doc-src/screenshots/intercept-filt.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 24 KiB |
BIN
doc-src/screenshots/intercept-mid.png
Normal file
BIN
doc-src/screenshots/intercept-mid.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 26 KiB |
BIN
doc-src/screenshots/intercept-options.png
Normal file
BIN
doc-src/screenshots/intercept-options.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 40 KiB |
BIN
doc-src/screenshots/intercept-result.png
Normal file
BIN
doc-src/screenshots/intercept-result.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 29 KiB |
Loading…
Reference in New Issue
Block a user