2 unstable releases
0.2.0 | May 27, 2022 |
---|---|
0.1.0 | Apr 12, 2022 |
#1 in #fiddler
88KB
1.5K
SLoC
Inn - A cross-platform packet capture tool similar to fiddler and whistle
Report a Bug · Request a Feature . Ask a Question
Report a Bug · Request a Feature . Ask a Question
Features
Supported
- Socks5 protocol
- Socks5 proxy server(Noauth or UserName/Password)
- Http/Https proxy protocol.
- Command line tool(inn-cli) to sign server certificate
- Act as your own certificate authority (CA) using the command line tool(inn-cli)
- Capture packets
- Filter packets
- A command line management tool(inn-cli)
- Js virtual machine
Getting Started
Step 1, Clone the source
$ git clone https://github.com/black-mongo/inn.git
$ cd inn
Step 2, Generate private key file and certificate file for ca
$ cargo run -p inn_cli -- genca -t ca -o ca/ca
Finished dev [unoptimized + debuginfo] target(s) in 0.68s
Running `target/debug/inn_cli genca -t ca -o ca/ca`
[2022-05-26T17:05:09Z DEBUG common::genca] ca/ca/cacert.pem
-----BEGIN CERTIFICATE-----
MIIBpzCCAU2gAwIBAgIJAO2/sI9ZEVIeMAoGCCqGSM49BAMCMDYxDDAKBgNVBAMM
A0lubjEMMAoGA1UECgwDSW5uMQswCQYDVQQGDAJDTjELMAkGA1UEBwwCQ04wIBcN
NzUwMTAxMDAwMDAwWhgPNDA5NjAxMDEwMDAwMDBaMDYxDDAKBgNVBAMMA0lubjEM
MAoGA1UECgwDSW5uMQswCQYDVQQGDAJDTjELMAkGA1UEBwwCQ04wWTATBgcqhkjO
PQIBBggqhkjOPQMBBwNCAAQgy7m1BWukJr8VAOxie56u+vBcaEOCZtu+k7x155B8
+gq+JuKSZoMRJwEmIjbgnPErMR6qzEYEXjH56Oiu09Ago0IwQDAOBgNVHQ8BAf8E
BAMCAYYwHQYDVR0OBBYEFB5SEVmPsL/tB9jDPvn9xvLs6qJuMA8GA1UdEwEB/wQF
MAMBAf8wCgYIKoZIzj0EAwIDSAAwRQIhAI8XyypwZC9Uzl457YGTiSK54kjtrrsO
hzY7kEjlTNioAiA0rn8LmSPPzn3aXJ/CPxTYvuSUx2V4O98Zn7cs2BVtNA==
-----END CERTIFICATE-----
[2022-05-26T17:05:09Z DEBUG common::genca] ca/ca/cakey.pem
-----BEGIN PRIVATE KEY-----
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgf2kKonKFODJuoQDv
qN3CohJ1jhIUptc1UuQja26ieJWhRANCAAQgy7m1BWukJr8VAOxie56u+vBcaEOC
Ztu+k7x155B8+gq+JuKSZoMRJwEmIjbgnPErMR6qzEYEXjH56Oiu09Ag
-----END PRIVATE KEY-----
The command cargo run -p inn
start inn sock5 server on port 4556
and https_proxy server on port 4557
Step3, Add ca/ca/cacert.pem
to your system root certificate storage and trust it
Step4, Setting https proxy to http://127.0.0.1:4557
with your browser
Step5, Open your browser with https://www.google.com
So far only www.google.com with MITM and other https web site will through tunnel, future add rules with MITM or tunnel
Contributing
First off, thanks for taking the time to contribute! Contributions are what makes the open-source community such an amazing place to learn, inspire, and create. Any contributions you make will benefit everybody else and are greatly appreciated.
Please try to create bug reports that are:
- Reproducible. Include steps to reproduce the problem.
- Specific. Include as much detail as possible: which version, what environment, etc.
- Unique. Do not duplicate existing opened issues.
- Scoped to a Single Bug. One bug per report.
License
Inn is licensed as MIT
Dependencies
~36–53MB
~1M SLoC