burpsuitetor_sticker

 

Hi everyone, Today i am going to demonstrate how to send BurpSuite requests through tor proxy servers.

 

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.

First understand the scenario what we are going to do,

In general we set our browser’s proxy to “127.0.0.1:9050” on which tor proxy daemon is running. So our request is directly going through “tor proxy servers” to the destination.
Browser –> Tor Proxy –> Destination

Lets add BurpSuite in-between the Browser and a Tor proxy, to do so we need to specify two interfaces to Burp one will handle requests from the browser to Burp and second will send requests from Burp to tor proxy.

Install tor  and   privoxy
For insalling tor  with  privoxy follow by previous post  Anonymous Scanning with Nmap in Kali Linux

 
Configure  Privoxy for BurpSuite

 

open /etc/privoxy/config file and uncomment the following line

 

#vi  /etc/privoxy/config

listen-address 127.0.0.1    8118

:wq!

 

Screenshot from 2014-08-02 10:30:10

 

Start both the services tor & privoxy.

#/etc/init.d/tor start

# /etc/init.d/privoxy start

 
Setting  BurpSuite

 

First you need to configure your browser to point to Burp for outbound HTTP & HTTPS connection, then you need to set your SOCKS proxy to point to your tor service running on port 9050 by default.

Screenshot from 2014-08-02 10:31:02

 

 

Finally configure BurpSuite to point to privoxy.

 

Select “options tab” in Burp and navigate to ‘upstream proxy server’ click on ‘add’ button. By default privoxy runs on port ‘8118’ so add proxy host and port accordingly.

 

Screenshot from 2014-08-02 10:33:25

 
To verify that you are being routed through tor network visit http://www.whatismyipaddress.com

 

Screenshot from 2014-08-02 10:42:07