Proxying BurpSuite through TOR

简介: Hi everyone, Today i am going to demonstrate how to send BurpSuite requests through tor proxy servers.
Hi everyone, Today i am going to demonstrate how to send BurpSuite requests through tor proxy servers. First understand the scenario what we are going to do, 
       In general we set our browser's proxy to "127.0.0.1:9050" on which tor proxy daemon is running. So our request is directly going through "tor proxy servers" to the destination.
Browser --> Tor Proxy --> Destination
Lets add BurpSuite in-between the Browser and a Tor proxy, to do so we need to specify two interfaces to Burp one will handle requests from the browser to Burp and second will send requests from Burp to tor proxy.

 Step 1:- Install tor  

Open /etc/apt/resouces.list file using any editor in BackTrack and add following line.
"deb http://deb.torproject.org/torproject.org  lucid main"
Open command prompt and run following commands  to install tor
gpg --keyserver keys.gnupg.net --recv 886DDD89
gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
apt-get update
apt-get install tor tor-goipdb
apt--get install privoxy
Now we have successfully installed tor & piroxy.

Step 2:- Configure

open /etc/privoxy/config file and uncomment the following line
forward-socks4a / 127.0.0.1:9050
start both the services tor & privoxy.
/etc/init.d/tor start
/etc/init.d/privoxy start

Step 3:-Set BurpSuite

First you need to configure your browser to point to Burp for outbound HTTP & HTTPS connection, then you need to set your SOCKS proxy to point to your tor service running on port 9050 by default.
 

Finally configure BurpSuite to point to privoxy. 
Select "options tab" in Burp and navigate to 'upstream proxy server' click on 'add' button. By default privoxy runs on port '8118' so add proxy host and port accordingly.



  To verify that you are being routed through tor network visit www.whatismyipaddress.com

Keep visiting blog for exploits and vulnerabilities :)
目录
相关文章
|
安全 算法 区块链
花无涯带你走进黑客世界之Tor洋葱网络
Tor本来是为用户提供匿名上网保护用户隐私的工具,但是对于一些用户来说,他们可以利用Tor的隐蔽性进行黑客攻击或非法交易活动。总结Tor的恶意应用主要表现在以下几方面。
601 0
|
安全 IDE Shell
利用badusb远程控制
badusb大家应该都了解过,是利用伪造HID设备执行攻击载荷的一种攻击方式。HID设备一般指的是计算机直接与人交互的设备,例如键盘、鼠标等 总的来说,就是将USB设备伪装成键盘设备,使目标主机被迫执行预置在固件中的恶意代码 通常情况下都会把badusb制作成与U盘极其相似,且不会被受害者所察觉,badusb目前在淘宝有售,下面是详细的用badusb拿shell的过程
594 0
|
安全 测试技术 数据安全/隐私保护
|
3天前
|
云安全 数据采集 人工智能
古茗联名引爆全网,阿里云三层防护助力对抗黑产
阿里云三层校验+风险识别,为古茗每一杯奶茶保驾护航!
古茗联名引爆全网,阿里云三层防护助力对抗黑产
|
3天前
|
存储 机器学习/深度学习 人工智能
大模型微调技术:LoRA原理与实践
本文深入解析大语言模型微调中的关键技术——低秩自适应(LoRA)。通过分析全参数微调的计算瓶颈,详细阐述LoRA的数学原理、实现机制和优势特点。文章包含完整的PyTorch实现代码、性能对比实验以及实际应用场景,为开发者提供高效微调大模型的实践指南。
503 1