At the LCA2012 conference earlier this year I presented “MITMproxy — use and abuse of a hackable SSL-capable man-in-the-middle proxy“.
The video of the talk is now available in a number of places :-
- YouTube – http://www.youtube.com/watch?v=kQ1-0G90lQg
- UO Department of Mathematics and Statistics, Free Software repository – http://mathmirror/mirror/media/LCA2012/mitmproxy_use_and_abuse_of_a_hackable_SSLcapable_maninthemiddle_proxy.ogv
- Linux Australia – http://mirror.linux.org.au/linux.conf.au/2012/mitmproxy_use_and_abuse_of_a_hackable_SSLcapable_maninthemiddle_proxy.ogv
MITMproxy is a python-based console tool to help you inspect & alter the HTTP conversation between a client and a server, regardless of whether it is over HTTPS or not. “It is not an attack tool”, but instead is a powerful tool for debugging applications at either end of the conversation.
Giving a talk at an LCA conference is excellent fun, and very rewarding. I have 6 months to come up with my next submissions!