• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      Intercepting HTTPS Requests With Burp Proxy

      • Posted by Muneeb Alam Khan
      • Date April 16, 2019

      We all know how burp proxy can be very useful to intercept and modify requests sent from applications to a server or to an API, this of-course is very useful to help understand how a specific application works, how it communicates with its server, and helps test the security of this application to discover vulnerabilities and even exploit them if there are any.

      Setting up burp proxy is pretty easy, all you have to do is start it, turn on the proxy, and set your web browser/application to use burp proxy as a proxy server, then all requests sent from that browser will have to go through burp proxy where we can analyse and modify them if we wanted to.

      The only challenge you might face is if the target website/application uses HTTPS, in this case you will have to install Burp’s CA certificate in your browser, some people find this a bit tricky so I decided to write this article to help 🙂

       

      Step 1 – Download Burp’s CA certificate, to do this first run burp, open up your web browser, and go to https://burp , you’ll see a link on the top right of the page called “CA Certificate” , click this link to download the certificate.

      Step 2 – Import the BURP CA certificate fire fox, you’ll need to go to preferences > type “view certificates” in the search bar > click on import > and select the certificate you downloaded in step 1.

      Once done you should see the certificate as shown below

       

      Step 3 – Upon intercepting the HTTPS request (for e.g. browsing google.com) burp shows the following

       

      Step 4 – As I press the forward button in Burp, my browser shows the following error

      This happens because the browser and burp are still not configured to handle HTTPS properly.

       

      Solution for the above error:

      Step 1 – Configure Burp Proxy in your Fire fox as mentioned below (To go access the proxy settings in FireFox go to Preferences and Type “proxy” in the search bar)

       

       

      Step 2 –  Type about:config in the url bar, hit enter. Search for “security.tls.version.max” and set 3 as the value instead of 4.

      Step 3 – Also Add the Rule in Burp to intercept the HTTPS requests

       

      Step 4 – Downgrade the default Java version to Java 8, to do so open your Kali Linux terminal and enter the below highlighted red command as shown in the snap shot

       

      Step 5 – Type number 2 to select Java 8 and just press enter and close the terminal then (you’ll only need to do this once).

      Now go the Burp turn on the Intercept and your browser should be forwarding requests sent from HTTPS pages to burp, and burp should be able to intercept them as shown below:

       

       

       

       

      • Share:
      author avatar
      Muneeb Alam Khan

      Previous post

      Gaining Root Privileges Using a Basic Exploit
      April 16, 2019

      Next post

      Breakdown of The Dragonblood WPA3 Flaws
      May 5, 2019

      You may also like

      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023
      Common-Authentication-Bypass-Techniques_370x208
      Common Authentication Bypass Techniques
      16 March, 2023

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance