L'homme du millieu
Du côté de l'attaquant, nous allons utiliser l'outil mitmproxy.
mitmproxy is an interactive man-in-the-middle proxy for HTTP and HTTPS. It provides a console interface that allows traffic flows to be inspected and edited on the fly.
Also shipped is mitmdump, the command-line version of mitmproxy, with the same functionality but without the frills. Think tcpdump for HTTP.
https://kali.org/tools/mitmproxy/
Avant de l'utiliser, nous allons créer un petit script python afin de récupérer plus d'informations sur les requêtes qui seront interceptées.
from mitmproxy import http
def request(flow: http.HTTPFlow) -> None:
if flow.request.method == "POST":
print(flow.request.pretty_url)
print(flow.request.headers)
print(flow.request.content.decode("utf-8", errors="ignore"))