SSL MITM using Burp Suite Proxies

SSL MITM using Burp Suite Proxies



  •  Configure BurpSuite proxy
    • Click on the proxy tab and then click on the options sub-tab.
    • Click the add button and type ‘443’ for the bind port.
    • Select the all interfaces radio button.
    • Click on the request handling tab and check the invisible proxy support box.
  • Run dns spoof atttack using dnsspoof
    dnsspoof -i wlan0

    1. Credential harvestingNow, you need only to wait for your victim to log into an HTTP or HTTPS application.  Their credentials will be displayed inside a POST request within the Burp Suite interface.

    DEMO

    Comments