A step-by-step guide on using mitmproxy to intercept and observe HTTPS traffic between kubectl and the Kubernetes API server. The setup involves extracting client certificates from a Kubeconfig file using yq and base64, then launching mitmproxy with specific flags to disable HTTP/2, supply the client cert, and skip upstream TLS

4m read timeFrom blog.scottlowe.org
Post cover image
Table of contents
Prepare Client CertificatesRunning Mitmproxy and Watching Traffic

Sort: