This assumes a couple of things.
- You want more keys in the future.
- You are on linux.
Step 1: Generate the key.
ssh-keygen -f ~/.ssh/<Name of key, can be anything> -N ''
Step 2: Add following to ~/.ssh/config
This assumes a couple of things.
Step 1: Generate the key.
ssh-keygen -f ~/.ssh/<Name of key, can be anything> -N ''
Step 2: Add following to ~/.ssh/config
"logging setup": { | |
"prefix": "logsetup", | |
"body": [ | |
"import logging", | |
"from rich.logging import RichHandler", | |
"", | |
"def setup_logging(verbosity: int = 0, force: bool = False) -> None:", | |
"\t\"\"\"", | |
"\tSet up a root logger with console output.", | |
"", |
$ sudo pacman -S tor
$ ## nyx provides a terminal status monitor for bandwidth usage, connection details and more.
$ sudo pacman -S nyx
Starting with Android Nougat, Google changed the way apps handle user certificates:
Apps that target API Level 24 and above no longer trust user or admin-added CAs for secure connections, by default.
This means that certificates issued by applications like [Charles][charles] or [mitmproxy][mitmproxy] are no longer accepted, so these proxies won't work for HTTPS traffic.
This tutorial explains what needs to be done to overcome that restriction and be able to sniff any Android app's HTTPS requests.