<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>zignar.net » Virtualbox</title>
    <link href="https://zignar.net/tags/virtualbox/index.xml" rel="self" />
    <link href="https://zignar.net" />
    <id>https://zignar.net/tags/virtualbox/index.xml</id>
    <author>
        <name>Mathias Fußenegger</name>
    </author>
    <updated>2015-12-31T00:00:00Z</updated>
    <entry>
      <title>Sniffing HTTPS traffic of a virtualbox guest VM using mitmproxy</title>
      <link href="https://zignar.net/2015/12/31/sniffing-vbox-traffic-mitmproxy" />
      <id>https://zignar.net/2015/12/31/sniffing-vbox-traffic-mitmproxy</id>
      <published>2015-12-31T00:00:00Z</published>
      <updated>2015-12-31T00:00:00Z</updated>
      <summary type="html"><![CDATA[<p>In this article I’ll show you how HTTPS traffic from a <a
href="https://www.virtualbox.org/">virtualbox</a> guest vm can be routed
through <a href="http://mitmproxy.org/">mitmproxy</a> in order to sniff
HTTPS traffic.</p>
<p>This might be useful, for example, if you wanted to figure out how a
JSON API works that you know an application that you’ve installed
uses.</p>
]]></summary>
    </entry>
</feed>
