Hi everyone, Today i am going to demonstrate how to send BurpSuite requests through tor proxy servers.
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulnerabilities.
First understand the scenario what we are going to do,
In general we set our browser’s proxy to “127.0.0.1:9050” on which tor proxy daemon is running. So our request is directly going through “tor proxy servers” to the destination.
Browser –> Tor Proxy –> Destination
Lets add BurpSuite in-between the Browser and a Tor proxy, to do so we need to specify two interfaces to Burp one will handle requests from the browser to Burp and second will send requests from Burp to tor proxy.
Install tor and privoxy
For insalling tor with privoxy follow by previous post Anonymous Scanning with Nmap in Kali Linux
Configure Privoxy for BurpSuite
open /etc/privoxy/config file and uncomment the following line
listen-address 127.0.0.1 8118
Start both the services tor & privoxy.
# /etc/init.d/privoxy start
First you need to configure your browser to point to Burp for outbound HTTP & HTTPS connection, then you need to set your SOCKS proxy to point to your tor service running on port 9050 by default.
Finally configure BurpSuite to point to privoxy.
Select “options tab” in Burp and navigate to ‘upstream proxy server’ click on ‘add’ button. By default privoxy runs on port ‘8118’ so add proxy host and port accordingly.
To verify that you are being routed through tor network visit http://www.whatismyipaddress.com