How to Configure Burp Suite to Intercept HTTP Requests and Responses.

Hello everybody and welcome back. Right now we will try to configure our Burp Suite in order for us to make it as a proxy in order for us to intercept our own, HTTP requests and responses.

If you find anything helpful in this post or funny, will you please leave a like because you will feel great helping other people find it?

So the Burp Suite which is a program that we will use is already preinstalled in Kali Linux. So if you go on to the applications right here and you go on to the web application analysis it should be the first one right here.

So if this is the first time for you running it, it might ask you for a root password. You just type it in and you open up the Burp Suite.

Now, another way that you can open it is through the command line.

So here it will basically just give us a message about the version. Just click okay. It doesn’t even matter what it says and it should open up our Burp Suite.

Now, I already configured my Burp Suite so it works for me. Basically, I will just show you the process. We will need to configure some of the things in our Firefox and also some of the things in the Burp Suite in order to capture our packets.

So just click here on ‘Next’.

‘Use Burp defaults’ click here on ‘Start Burp’ and it should start in a few seconds.

Now, what I wanted to say is that you can also run it through a command line with ‘burpsuite’ and it will just open up the same thing right here.

It will use your terminal for it so you don’t have to go to the applications and so on and so on.

So as you can see right here, this is the Burp Suite.

It has a bunch of options. It is used for us to intercept our own packets. Here we have some of the options such as HTTP history.

Here we will have the websites that we visited in the current session.

Here you have the intercept. Here you have the option that the intercept is on and intercept is off.

Now, before I cover all of these options I just want to show you what you need to do in order to get this to work.

So what you want to go to is go to the proxy which is the second one from the left and then below that you want to go to the options. So ‘Proxy’ and then ‘Options’.

Here we are interested in the “Proxy Listeners’ part, but you will have by default this 127.0.0.1 on port 8080 which is listening on 8080 on a local host.

Now, what you want to do is select that one and basically just click here on the ‘Edit’ and it should open up this small window where you want to specify the ‘bind to port’ to be 8080 and basically you can put here all interfaces or ‘loopback only’.

I will leave it on ‘lookback only’ and you can also specify a certain address. So for example, my current IP address of this virtual machine is 192.168.1.6, but I will leave it on localhost and on ‘loopback’ only since I will specify that proxy in my Firefox as well.

So just click on the ‘Okay’. So port 8080, loopack only, 127.0.0.1, click here on ‘Okay’.

Now what we want to do is go to our Firefox. So open up your web browser and where you want to go is basically here on the right this three lines ‘Open menu’ and go to the ‘Preferences’.

Now under the preferences you want to go to the ‘General’ which is already opened right here by default. You want to scroll all the way down and find the ‘Network Proxy’. So here we can see ‘Configure how Firefox connects to the Internet’.

What we want to do is basically make our Firefox connect to the internet through our Burp Suite. So click on the ‘Settings’ and it should open up this small window.

By default it should be set on ‘No proxy’. What you want to do is change that to be set on the ‘Manual proxy configuration’. So once you check that, I believe since you didn’t configure it before it should have only the first one which is ‘HTTP’ proxy set on 127.0.0.1 on port 8080.

Now, what you want to do is all of these four you want to set on the same settings which is basically even the SSL, even the FTP, even the SOCKS host you want to set all of these four onto the IP address of your local host which is 127.0.0.1. And all of those four want to be set on the port 8080.

Once you set all of these four to be exactly the same, you want to check here SOCKS v5. It should be checked by default, but if it is not check SOCKS v5.

Once you do that, click here on ‘Okay’ and you should be good to go.

So if we click ‘Setting’ again we can see that now our manual configuration proxy is set on the local host.

Now, if you go to your browser and try to search google.com, first of all it won’t work for you. It should say something like ‘Insecure connection’ or something like that. Basically, it won’t let you connect to google.com. But if you for example, go to an HTTP web site, you should be able to connect to any HTTP website, but you will not be able to connect to any HTTPS website.

Now, if you typed here any HTTP website and it is loading on forever, what you want to do is go to your Burp Suite and make intercept off.

So if your intercept is on like it is right now for me, it won’t let you load any page since it will wait for you to forward or drop the packet. Let me just show you what I’m talking about.

If I refresh this page right here, you will see that this will load forever. It will never load the page.

And in the Burp Suite, we can see that it basically gave us some of the HTTP request header for this website which is just my OWASP vulnerable machine and it will ask me if I want to drop this packet which means to discard it or to forward that packet to that machine.

Now, if I forward it and I open up my Firefox you can see that now it loaded the page, because I forwarded the packet.

Now, if you have the intercept checked on which means the intercept is on, you want to make it off so you can load the page without forwarding every packet.

Now, we want to also make sure that we can load our HTTPS websites. For me it works, but for you it won’t work until you install in your Firefox a Burp Suite CA certificate.

Basically, we need to install the Burp Suite certificate in our Firefox in order for our Firefox to look at Burp Suite as a trusted proxy source.

So in order to do that first of all, make sure your Burp Suite is running, make sure that you configured the preferences in Firefox. So make sure that this is the same as mine.

Make sure the Burp Suite is running. If it’s not running, this won’t work. You won’t be able to download a certificate. And once this is the same as mine, and once you run the Burp Suite and the intercept is off, you want to go and open up a new tab and type here HTTP and then Burp. Just that.

So once you type that it will lead you to this page where it will say ‘Burp Suite Community Edition. Welcome to Burp Suite Community Edition’.

What you want to go on here is on the CA certificate and click on it. It will ask you if you want to download this file.

‘Do you want to save it?’ Yes.

So the file is 973 bytes so it’s not that large. You just click here on the ‘Save’ and once it downloads you find where you saved it. I already have one downloaded so I have it right here.

You will only have one of these. So once you find it you want to go to your Firefox, again to the ‘Preferences’, but instead of going to the Network Proxy’ settings, we want to go to the ‘Privacy & Security’  settings.

So once you are there, once you’re at the ‘Privacy & Security’ settings what you want to do is basically scroll down and find the certificates.

So here are the certificates and you want to go on to the ‘View Certificates’.

Once this window opens up, it will show you a bunch of the certificates that are already in your Firefox web browser.

Now, what you want to do is import the already downloaded certificate that we downloaded from this website which is HTTP Burp. How do we that? Well, basically we just go on to the import right here.

So click on the ‘Import’ and find where this file is saved for you. I already imported it so I won’t be importing it twice. Here it is. Just click on the file and click on ‘Open’.

And once it does that click on “Okay’ and you should be good to go.

Now, after that if you type google.com once again, it should be loading the HTTPS websites as well as the HTTP websites.

Now, if this didn’t work make sure once again that the Burp Suite is running or this will not work. Make sure that all of the options are already set as mine and you should be good to go.

Now, once we made this work for HTTP and HTTPS now we can track all of the packets going through our own Burp Suite. As we can see right here if I go on to the target, it will give me a list of all the hosts that I’ve already visited.

As we can see right here this is just a bunch of the HTTP request packets that I sent in order to visit my virtual machine which is on the IP address of 192.168.1.9.

Now, in the next tutorial, I will show you some of these packets, how you can configure them, how you can change them and all of that, and where you can find all the websites that you visited and specific packet if you search for it.

But for now just make sure that your Burp Suite works and that when you visit a website, for example, facebook.com, it should open up the Facebook page and it should also have here a bunch of other Facebook domains opened.

As you can see the page that you requested will be the darker letters than the ones that it automatically searched for in order to get to your Facebook page.

And we can see, this is our Facebook page and the HTTP requests that we got from it.

So I will make sure to explain the requests and responses better in the next video.

Until then I hope you’re having a great day and take care.

Final Words from Jerry Banfield.

Wow, you are one of the only people that made it all the way to the end.

Thank you for watching this entire video.

We have a video course for you called Master Ethical Hacking in 2019 on Uthena that we imagine given you’ve watched all of this, you might really love and enjoy the complete course.

If you’d like to get the complete course which includes answers to your questions and it includes lifetime updates and new videos, will you please go to uthena.com and buy Master Ethical Hacking in 2019.

Alternatively, you might love the Ethical Hacking Forever course bundle where you can get six courses currently in this bundle plus every single course we add for life at no additional cost.

I intend to add at least 20 more ethical hacking courses to this bundle to make it the very best Ethical Hacking course bundle in the world. I already think it is today, of course, because it’s mine.

Thank you for being here and watching this. I trust if you found this helpful, you will leave a like on the video and subscribe to see more and maybe you’ll take a look in the description of the Youtube video where you might find some links that you will love.

I love you.

You’re awesome.

Thanks for being here with me and I will see you again soon on another video on our Jerry Banfield YouTube channel.

Leave a Like on the Video?

Thank you very much for getting to the end of this video.

Will you please leave a like on it, because you will feel great doing that. Every like helps the video immensely to get out there to other people.

Thank you very much for helping us share this video by leaving a like.

Love,

Jerry Banfield.