Replies: 2 comments 2 replies
-
mitmproxy will pass through HTTP requests as-is (so typically no way to detect it on this layer). However, you could definitely fingerprint the TLS ClientHello, which will be different. |
Beta Was this translation helpful? Give feedback.
2 replies
-
Not right now.
…On Sun, Apr 9, 2023, 11:30 DnyyGzd ***@***.***> wrote:
I've read thread #4575
<#4575>, is there a way to
use a browser-like TLS ClientHello?
—
Reply to this email directly, view it on GitHub
<#6055 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAHY2PV36VHITG2NDY5GCA3XAJ6TZANCNFSM6AAAAAAWWLYUHA>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I am using the default mode of mitmproxy. I have a question, is it possible for a web server to detect the use of the mitmproxy?
Beta Was this translation helpful? Give feedback.
All reactions