From 5acdd78b15ac85c6727f03e71d843d4b20e1a8d2 Mon Sep 17 00:00:00 2001 From: Maximilian Hils Date: Tue, 14 Feb 2017 17:45:54 +0100 Subject: [PATCH] fix typo --- examples/complex/dns_spoofing.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/examples/complex/dns_spoofing.py b/examples/complex/dns_spoofing.py index 1fb59f74c..c6d46b66d 100644 --- a/examples/complex/dns_spoofing.py +++ b/examples/complex/dns_spoofing.py @@ -1,5 +1,5 @@ """ -This inline scripts makes it possible to use mitmproxy in scenarios where IP spoofing has been used to redirect +This script makes it possible to use mitmproxy in scenarios where IP spoofing has been used to redirect connections to mitmproxy. The way this works is that we rely on either the TLS Server Name Indication (SNI) or the Host header of the HTTP request. Of course, this is not foolproof - if an HTTPS connection comes without SNI, we don't