Continuing with this post, we will now try to perform a MITM atack over the vulnerable subdomains with mitmproxy.

Continue reading...