Django入门分享
在B站上准备连更Django入门视频教程(已更到30), 地址: https://www.bilibili.com/video/BV1Q1GveGEpE/?vd_source=5b28eeafcb78cfe3946eef85cf8d4bf0
……每一行错误,都值得记录。
在B站上准备连更Django入门视频教程(已更到30), 地址: https://www.bilibili.com/video/BV1Q1GveGEpE/?vd_source=5b28eeafcb78cfe3946eef85cf8d4bf0
……找到一篇docker设置代理的方法,三个不同阶段有不同的代理方式,链接如下。
……1、 HostAliases:定义了 Pod 的 hosts 文件(比如 /etc/hosts)里的内容,用法如下:
……解析TLS数据包
https://www.ilikejobs.com/posts/wireshark/
Using the (Pre)-Master-Secret
The master secret enables TLS decryption in Wireshark and can be supplied via the Key Log File. The pre-master secret is the result from the key exchange and can be converted to a master secret by Wireshark. This pre-master secret can be obtained when a RSA private key is provided and a RSA key exchange is in use.
Step-by-step instructions to decrypt TLS traffic from Chrome or Firefox in Wireshark:
Close the browser completely (check your task manager just to be sure).
Set environment variable SSLKEYLOGFILE to the absolute path of a writable file.
Start the browser.
Verify that the location from step 2 is created.
In Wireshark, go to Preferences -> Protocols -> TLS, and change the (Pre)-Master-Secret log filename preference to the path from step 2.
Start the Wireshark capture.
Open a website, for example https://www.wireshark.org/
Check that the decrypted data is visible. For example, using the tls and (http or http2) filter.
For Windows, an environment variable can be set globally as described in this walkthrough, but this is not recommended since it is easy to forget about and may be a security issue since it allows decryption of all your TLS traffic. A better way to set the environment variable is via a batch file. Create a file start-fx.cmd with:
@echo off
set SSLKEYLOGFILE=%USERPROFILE%\Desktop\keylogfile.txt
open firefox
http.host == “openapi.bei.com” and http.request.uri.query.parameter == “product_ids=%5B%271300028%27%5D”
……代理设置
curl curl -I -x “http://172.16.1.90:7890” https://www.google.com curl –socks5 “127.0.0.1:1234” “https://ip.oxylabs.io/" –proxy-user user:pwd
全局设置 export https_proxy=http://172.16.1.90:7890 http_proxy=http://172.16.1.90:7890 all_proxy=socks5://172.16.1.90:7890
……