- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 197字
- 2021-06-24 18:44:59
Burp Proxy with HTTPS websites
Burp Proxy also works with HTTPS websites. In order to decrypt the communication and be able to analyze it, Burp Proxy intercepts the connection, presents itself as the web server, and issues a certificate that is signed by its own SSL/TLS Certificate Authority (CA). The proxy then presents itself to the actual HTTPS website as the user, and it encrypts the request with the certificate provided by the web server. The connection from the web server is then terminated at the proxy that decrypts the data and re-encrypts it with the self-signed CA certificate, which will be displayed on the user's web browser. The following diagram explains this process:

The web browser will display a warning, as the certificate is self-signed and not trusted by the web browser. You can safely add an exception to the web browser, since you are aware that Burp Proxy is intercepting the request and not a malicious user. Alternatively, you can export Burp's certificate to a file by clicking on the corresponding button in Proxy Listeners by going to Proxy | Options and then import the certificate into the browser and make it a trusted one:

- pcDuino開發(fā)實(shí)戰(zhàn)
- Social Media Mining with R
- Implementing Cisco UCS Solutions
- FreeRTOS實(shí)時內(nèi)核應(yīng)用指南
- SharePoint 2013 應(yīng)用開發(fā)實(shí)戰(zhàn)
- 深入理解eBPF與可觀測性
- Windows Phone 8 Application Development Essentials
- Linux系統(tǒng)安全基礎(chǔ):二進(jìn)制代碼安全性分析基礎(chǔ)與實(shí)踐
- Windows 7案例教程
- 操作系統(tǒng)分析
- Linux設(shè)備驅(qū)動開發(fā)
- Building Telephony Systems With Asterisk
- iOS 10 開發(fā)指南
- Getting Started with Citrix XenApp 6.5
- Apache ShardingSphere權(quán)威指南