Hi everyone, I’ve been trying to understand how MiTM setups like a transparent proxy work.

Obviously, the use-case here is in a personal scope: I’d like to inspect the traffic of some of my machines. I am aware that Squid can be a transparent proxy, and some might use the Burp Suite to analyse network traffic.

Could someone explain the basic networking and the concept of certificates in this scenario? I feel like I don’t understand how certificates are used well enough.


For example: I realise that if someone inserts a root certificate in the certificate store of an OS, the machine trusts said CA, thus allowing encrypted traffic from the machine to be decrypted. However, say the machine was trying to access Amazon; won’t Amazon have its own certificate? I don’t know how I’m confused about such a simple matter. Would really appreciate your help!

  • Monkey With A Shell
    link
    fedilink
    English
    3
    edit-2
    1 year ago

    https://play.google.com/store/apps/details?id=app.greyshirts.sslcapture

    Something like that should ship all traffic through a local VPN adapter and output a standard pcap file.

    Another option if you have a bit more fancy networking available is to set up a security onion instance, then mirror a port on the network and just capture everything at an on-wire level. That would also cover things beyond just web traffic to catch other things like ssh or whatever other remote connectivity could be in play. Seeing the content of the connection is different than just seeing the connections existence though. The endpoint generally has the best visibility before data gets pushed into a a connection but unless you start getting into kernel level debugging it can still be hard to see into the behavior of internal applications.

    https://play.google.com/store/apps/details?id=eu.faircode.netguard

    This is also a local VPN way of seeing all the outgoing traffic along with allowing control of it as a local firewall.

    • @MigratingtoLemmyOP
      link
      English
      11 year ago

      Hi, thanks for the resources. However, I don’t think I’ll be able to decrypt the traffic from my mobile using this, yes? Using a VPN for this is a great idea though, this also happens to be how NoRoot firewalls work on Android