Configuring your browser with Burpsuite



Hello Everyone in this blog we are going to learn how to configure your browser with burp suite.

You can configure any browser with burp suite but my preferred browser is Firefox.

So Once you have installed your Burpsuite, follow the steps given below.

1. Go to Proxy Tab -->Options-->Proxy Listeners. Check whether the proxy listener is running or not. then tick the running check box.


2. You can go with the same setting with port 8080 since this port is quite common. I personally prefer to go with a different port (8081), You can change the port by click on the edit button, change the port number and click ok.


3. Now open your Firefox browser, Open Menu-->Options-->Search Tab= "Proxy."


4. Click on Settings -->Configure Proxy Access to the Internet -->Manual Proxy Configuration. Add your respective setting of the Proxy listener here and tick the check box (Also use this proxy for FTP and HTTPS). Then click ok.



5. Now go to your URL bar and write http://burp if you are able to see a welcome message from burp then you have successfully configured it.

6. Now Click on CA Certificate and Download it.




7 .Now go to Option menu -->Options-->Search Tab=Certificates.

   

8. Click on View Certificates-->Authorities-->Import and select the path of your certificate and mark both the check box for do you trust this certificate.



9. Turn on your Intercept and you are good to go now. 



Alternatively

For Proxy Setup Alternatively, you can use browser extension foxy proxy (FoxyProxy). Add the extension and follow the steps.

1. Click on FoxyProxy Extension -->Options.

2. Click on add and put information related to your proxy listener and click on save.



3. Now go to foxy proxy extension and select burp and make your intercept on and now you can start hunting.

    

 If you end up till now,  hope you liked this blog, and do share your doubts in the comment section.

Disclaimer:

The views, thoughts, and opinions expressed in the blog belong solely to the author and may conflict with others. Readers are advised to read at their own risk and expertise.

Author:

Ashish Chaubey

LinkedIn



























Comments

Popular posts from this blog

KaffeeSec - SoMeSINT THM Writeup

Getting Started In Hacking