Client-side proxies
A client-side proxy intercepts HTTP and HTTPS traffic, allowing a penetration tester to examine communications between the user and the application. It allows the tester to copy the data or interact with requests that are sent to the application. The client-side proxies were initially designed to debug the application to rectify any functional bugs, the same functionality can be abused by the attackers in performing all the man-in-the-middle type of attack scenarios.
Kali comes with several client-side proxies, including Burp Suite, OWASP ZAP, Paros, ProxyStrike, the vulnerability scanner Vega, and WebScarab. After extensive testing, we have come to rely on Burp Proxy, with ZAP as a backup tool. In this section, we will explore more on the Burp Suite.
Burp Proxy
Burp is primarily used to intercept HTTP(S) traffic; however, it is part of a larger suite of tools that has several additional functions, including:
- An application-aware spider that crawls the site
- A vulnerability...