Using MITM proxy to modify and attack