Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Application Penetration Testing with Burp Suite

You're reading from   Hands-On Application Penetration Testing with Burp Suite Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

Arrow left icon
Product type Paperback
Published in Feb 2019
Publisher Packt
ISBN-13 9781788994064
Length 366 pages
Edition 1st Edition
Arrow right icon
Authors (3):
Arrow left icon
Dhruv Shah Dhruv Shah
Author Profile Icon Dhruv Shah
Dhruv Shah
Riyaz Ahemed Walikar Riyaz Ahemed Walikar
Author Profile Icon Riyaz Ahemed Walikar
Riyaz Ahemed Walikar
Carlos A. Lozano Carlos A. Lozano
Author Profile Icon Carlos A. Lozano
Carlos A. Lozano
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Configuring Burp Suite FREE CHAPTER 2. Configuring the Client and Setting Up Mobile Devices 3. Executing an Application Penetration Test 4. Exploring the Stages of an Application Penetration Test 5. Preparing for an Application Penetration Test 6. Identifying Vulnerabilities Using Burp Suite 7. Detecting Vulnerabilities Using Burp Suite 8. Exploiting Vulnerabilities Using Burp Suite - Part 1 9. Exploiting Vulnerabilities Using Burp Suite - Part 2 10. Writing Burp Suite Extensions 11. Breaking the Authentication for a Large Online Retailer 12. Exploiting and Exfiltrating Data from a Large Shipping Corporation 13. Other Books You May Enjoy

Working with non-proxy-aware clients

A non-proxy-aware client, in this context, is a client that makes HTTP requests but has no easy way to configure proxy options, or has no proxy support at all.

Common examples of non-proxy-aware clients are thick client applications or browser plugins that do not use the browser's proxy options. Burp's support for invisible proxying allows non-proxy-aware clients to connect directly to a proxy listener. This allows Burp to intercept and modify traffic based on target mappings.

Architecturally, this works by setting up a local DNS entry for the remote target that the non-proxy-aware client communicates with. This DNS entry can be made in the local hosts file, as follows:

127.0.0.1 example.org

The client then communicates with 127.0.0.1 instead of the actual IP address of example.org. To complete the circuit, local listeners would have to be set up with invisible Burp proxy support on port 80 (or whatever other port the server is listening on). The non-proxy-aware client will then resolve the domain name to 127.0.0.1, and send requests directly to the listener on that interface.

Burp, by default, will forward requests to the destination based on the host header that was obtained from the request header of the client. However, an interesting problem presents itself here. As the DNS entry for the destination has been set to 127.0.0.1, Burp will resolve the destination incorrectly and forward the request to itself, creating a loop.

This can be fixed by using an IP address instead of the domain name/hostname in the Redirect to host option under the Request handling tab, as shown in the following screenshot:

If the client communicates to multiple domains, then Burp's hostname resolution feature, available under the Project Options tab in the main window, can be used to individually map each request to the correct destination IP address. Each of these destinations should also be added to the host's file to ensure traffic destined for these hosts is sent via Burp.

You have been reading a chapter from
Hands-On Application Penetration Testing with Burp Suite
Published in: Feb 2019
Publisher: Packt
ISBN-13: 9781788994064
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime