Advanced Web Attacks and Exploitation: Figure 5: Burp Suite Proxy Running
Advanced Web Attacks and Exploitation: Figure 5: Burp Suite Proxy Running
Now that the proxy service is running, we need to configure a browser. Burp Suite includes an
embedded Chromium browser that is preconfigured to proxy traffic through Burp Suite’s proxy.
We can launch it by clicking on the Proxy tab and then the Intercept tab.
2.1.1.1.1
We can launch the embedded Chromium browser by clicking on either of the Open Browser
buttons on this tab.
Now that our proxy is set up, we will briefly test it. In this case we will navigate to the lab VM that
is hosting a vulnerable version of the Concord9 web application. Please note that for this course,
we have made hosts entries in our Kali Linux attacking machine that allow us to refer to the lab
machines by name.
kali@kali:~$ cat /etc/hosts
127.0.0.1 localhost
127.0.1.1 kali
Make sure to edit your /etc/hosts file on your Kali Linux box in order to reflect the
IP addresses of the vulnerable targets that can be found in your student control
panel.
If we now try to browse to the http://concord:8001/ URL, we will notice that the browser is not
completing the request since Burp Suite turns on the Intercept feature by default.
9
(Walmart, 2021), https://concord.walmartlabs.com/
As the name suggests, this feature intercepts requests sent to the proxy. It then allows us to
either inspect and forward a request to the target or drop it by using the appropriate buttons as
shown in Figure 8.
For the purposes of this module, we can safely turn this feature off by clicking Intercept is on. The
text on the button will update to “Intercept is off”.
The HTTP history tab is fairly self-explanatory–this is where Burp Suite lists the entire session
history, which includes all requests and responses proxied through it.
Excellent. We have verified that Burp Suite is capturing our browser traffic.
Here we’ll choose the Manual option, setting the appropriate IP address and listening port. In our
case, the proxy and the browser reside on the same host, so we’ll use the loopback interface and
specify port 8080. However, if we planned on using the proxy to intercept traffic from multiple
machines, we would use the public IP address of the machine running the proxy for this setting.
Finally, we also want to check the Use this proxy server for all protocols option in order to make
sure that we can intercept every request while testing the target application.