O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Burp Proxy to intercept HTTP traffic

In this recipe, we will use the Burp Proxy to intercept our browser traffic and manipulate the parameters on the go.

Getting ready

To step through this recipe, you will need Kali Linux running on Oracle Virtualbox and an Internet connection. No other prerequisites are required.

How to do it...

For this recipe, you need to perform the following steps:

  1. To start Burp, go to Menu | Kali Linux | Applications | burpsuite and click on the Start burpsuite, as shown in the following screenshot:

    How to do it...

  2. Also open Firefox and navigate to Edit Menu | Preferences | Advance Tab | Network | Settings and set the proxy as 127.0.0.1 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required