1 00:00:00,420 --> 00:00:03,720 So let's start at burb and open a proxy tab. 2 00:00:04,760 --> 00:00:07,100 New tabs are opened under proxy. 3 00:00:08,040 --> 00:00:11,490 And the proxy tool is pretty much the heart of the sweet. 4 00:00:12,980 --> 00:00:17,300 And by using this tool, we can manually analyze HTTP messages. 5 00:00:18,210 --> 00:00:23,930 So to accomplish this, we need to configure burb as well as the Web browser to work together. 6 00:00:25,240 --> 00:00:27,220 All right, so let's go to the options tab. 7 00:00:28,450 --> 00:00:30,850 So here's the basic setting for intercepting. 8 00:00:32,110 --> 00:00:37,600 By proxy works as a man in the middle proxy right between the Web browser and the remote server. 9 00:00:38,530 --> 00:00:47,440 So that means a proxy is going to listen to a report on the local machine and we are going to redirect 10 00:00:47,470 --> 00:00:49,810 all browser traffic to that port. 11 00:00:50,780 --> 00:00:54,500 So that means that we need to arrange a port for burb to listen. 12 00:00:55,640 --> 00:01:03,100 But it has a default configuration on Port 80, 80, as you can see here, it listens on Port 80, 80 13 00:01:03,110 --> 00:01:04,130 on the local machine. 14 00:01:05,080 --> 00:01:12,040 And here, one two seven zero zero to one points to your local machine called Linux. 15 00:01:13,400 --> 00:01:18,310 Of course, you can change this configuration using the buttons on the left hand side. 16 00:01:18,340 --> 00:01:26,620 You can easily add, modify or remove listening port or you can always restore to the default configuration. 17 00:01:27,500 --> 00:01:32,690 So after arranging the listening port, the next thing is to define the interception rules. 18 00:01:34,110 --> 00:01:39,110 So Burb provides a rule-based mechanism to intercept traffic directed by the Web browser. 19 00:01:40,300 --> 00:01:45,670 So this way you can focus only on the request that you want to capture. 20 00:01:46,700 --> 00:01:50,930 And you can add, delete or modify any rule by using the buttons on the left. 21 00:01:52,410 --> 00:01:55,170 But for now, we don't need to add any rule. 22 00:01:56,510 --> 00:02:02,600 But when you're doing real tests, I believe you will need it and burb also has the same mechanism for 23 00:02:02,600 --> 00:02:04,640 intercepting server responses. 24 00:02:05,890 --> 00:02:09,040 So you can define or modify rules for your pen test. 25 00:02:09,960 --> 00:02:14,850 But you do need to check this box to enable intercepting responses first. 26 00:02:15,770 --> 00:02:18,770 See, now you can define more granular rules. 27 00:02:20,080 --> 00:02:22,280 OK, so now let's go to the intercept tap. 28 00:02:23,080 --> 00:02:28,150 So this is the main tab that you will display and intercepted HTP message you. 29 00:02:29,310 --> 00:02:36,120 And this button globally enables or disables intercepting HDB messages to analyze manually. 30 00:02:37,250 --> 00:02:41,570 So thanks to these default configurations, we really don't have to do much more. 31 00:02:42,360 --> 00:02:47,240 I did want to give you a little tour, so Berp is ready to work. 32 00:02:48,570 --> 00:02:50,790 So let's open your browser. 33 00:02:52,320 --> 00:02:54,960 And I will assume that you are using callisthenics. 34 00:02:56,570 --> 00:03:01,220 And Kelly has Firefox and Chromium for browsing the web. 35 00:03:02,300 --> 00:03:05,660 As I said before, I'm going to use Firefox as my main browser. 36 00:03:06,340 --> 00:03:10,620 Of course, you can follow these same steps for any other browser. 37 00:03:10,630 --> 00:03:11,290 It's up to you. 38 00:03:11,290 --> 00:03:12,610 It is going to look a little different. 39 00:03:12,940 --> 00:03:17,170 OK, so now I'm opening Firefox preferences from the menu. 40 00:03:18,290 --> 00:03:23,750 And scrolling down below, click the settings button under the network proxy section. 41 00:03:25,250 --> 00:03:29,000 So this window, Firefox enables us to use proxies. 42 00:03:29,980 --> 00:03:36,010 And you can configure their use, so this is the first time that you're opening up here, you probably 43 00:03:36,010 --> 00:03:37,240 will get these settings. 44 00:03:37,860 --> 00:03:43,270 OK, so we need to enable Firefox to redirect all the traffic to port AT&T. 45 00:03:44,560 --> 00:03:51,700 And don't forget the burleson's listens on this port, so check the manual proxy configuration. 46 00:03:52,870 --> 00:03:57,940 Typed the IP address of your local machine, which is one two seven zero zero one. 47 00:03:58,900 --> 00:04:09,640 And the port is 88 and then check this box to send, so it also sends https traffic to berp now before 48 00:04:09,670 --> 00:04:12,100 saving the setting, delete this entry here. 49 00:04:13,560 --> 00:04:17,340 Because it will prevent the redirect local traffic to proxy. 50 00:04:18,330 --> 00:04:20,910 And nothing to add then save. 51 00:04:22,390 --> 00:04:24,280 So now open a new browser tab. 52 00:04:25,540 --> 00:04:27,610 OK, is Barbizon intercept mode? 53 00:04:28,710 --> 00:04:35,070 The browser redirects the traffic to berp, now go to the vulnerable applications login page. 54 00:04:35,990 --> 00:04:37,730 And I'll click this bookmark. 55 00:04:39,070 --> 00:04:42,880 And see, as soon as you have the address, Burke gets a request. 56 00:04:43,750 --> 00:04:49,090 So this is just an HTTP request, as you remember from the previous videos. 57 00:04:50,300 --> 00:04:54,140 So now, after capturing the request, you can do several things. 58 00:04:55,250 --> 00:05:01,880 By using this action button, you can send this request to other tools for further analysis. 59 00:05:03,240 --> 00:05:10,020 Or you can say the request and do many other things with you, and if you are finished with a request, 60 00:05:10,020 --> 00:05:14,250 then you can either drop or forward their request. 61 00:05:15,350 --> 00:05:16,670 So I'm going to forward it. 62 00:05:18,090 --> 00:05:22,590 And then see how immediately catches the associated response message. 63 00:05:23,430 --> 00:05:29,370 So this is a raw response message matters first and then the body of the message comes. 64 00:05:31,390 --> 00:05:36,670 Now clicking on the headers tab, you can display just the headers of this message. 65 00:05:38,130 --> 00:05:42,330 And you can also perform some of the same actions here. 66 00:05:43,430 --> 00:05:47,480 And then when you're done with a response, you can forward or drop it. 67 00:05:48,540 --> 00:05:49,980 So, again, I'm going to forward it. 68 00:05:51,630 --> 00:05:58,560 Now, because berp is in this interception mode, it's also going to intercept some other requests as 69 00:05:58,560 --> 00:05:58,910 well. 70 00:05:59,900 --> 00:06:02,360 So I'm going to forward all of them. 71 00:06:05,070 --> 00:06:08,850 And then finally, the login page is displayed in the browser. 72 00:06:09,680 --> 00:06:13,060 So burb also holds the history information for us. 73 00:06:13,950 --> 00:06:18,020 So let's go to the history tab and click on any request. 74 00:06:18,990 --> 00:06:22,080 And so you'll find the details about that request. 75 00:06:23,780 --> 00:06:28,270 So this is how we intercept HTP messages with the proxy tool. 76 00:06:29,710 --> 00:06:37,210 For better interception experience, we can install a Firefox add on so we can easily redirect the traffic 77 00:06:37,210 --> 00:06:37,630 to burb. 78 00:06:39,110 --> 00:06:45,290 Now, while Penn testing, it's not necessarily efficient to change the proxy settings from Firefox 79 00:06:45,290 --> 00:06:46,160 each time, right. 80 00:06:46,940 --> 00:06:48,290 So what do I do? 81 00:06:48,290 --> 00:06:51,020 I advise you to use a proxy ext. 82 00:06:51,980 --> 00:06:55,700 I'm going to use Foxe proxy and I'll show you how to install it. 83 00:06:56,930 --> 00:06:59,810 But first, let's disable berp interception. 84 00:07:01,340 --> 00:07:04,190 And disable Firefox internal proxy settings. 85 00:07:09,320 --> 00:07:12,770 OK, so now let's go to the Firefox add ONS website. 86 00:07:14,050 --> 00:07:15,840 Let me just zoom in on the page for you. 87 00:07:16,890 --> 00:07:20,070 And type Foxe proxy and the search field. 88 00:07:21,220 --> 00:07:22,390 Click the first result. 89 00:07:23,730 --> 00:07:25,770 Then click add to Firefox. 90 00:07:26,850 --> 00:07:27,630 And click, add. 91 00:07:28,920 --> 00:07:31,200 OK, so it gets installed very quickly. 92 00:07:32,660 --> 00:07:35,480 So after installation, you see this icon in the toolbar. 93 00:07:36,700 --> 00:07:37,570 Click options. 94 00:07:39,480 --> 00:07:42,990 Now, from this page, we can add proxy's to Foxe proxy. 95 00:07:44,310 --> 00:07:47,790 And then later on, we can switch between them very quickly. 96 00:07:48,870 --> 00:07:53,490 So click and I'll put it in the title Berp. 97 00:07:54,700 --> 00:08:00,760 IP addresses are a local machine, 127000 one and port is AT&T. 98 00:08:02,070 --> 00:08:03,870 Like that, you can also assign a color. 99 00:08:04,970 --> 00:08:05,630 So save it. 100 00:08:06,950 --> 00:08:09,230 OK, so we added the configuration. 101 00:08:10,250 --> 00:08:11,630 Then you can close this tab. 102 00:08:13,630 --> 00:08:15,190 And quickly, icon. 103 00:08:16,510 --> 00:08:19,300 And what do you see the configurations listed here? 104 00:08:20,320 --> 00:08:25,060 Now click to activate this configuration, so I think it's really a timesaver. 105 00:08:25,960 --> 00:08:29,110 And go to be Web login page. 106 00:08:30,630 --> 00:08:33,930 And yeah, Berp intercepts a request again. 107 00:08:35,650 --> 00:08:36,850 Forward the messages. 108 00:08:37,870 --> 00:08:42,490 Now I'm going to disable proxy to send traffic to berp. 109 00:08:44,220 --> 00:08:47,520 And there it is, it's just that easy. 110 00:08:49,090 --> 00:08:52,330 So click another page and you can see. 111 00:08:54,040 --> 00:08:57,120 The traffic is not redirected to berp anymore. 112 00:08:58,820 --> 00:09:06,740 Oh, and one last thing to say here, with default browser usage, you will see many unrelated messages 113 00:09:06,740 --> 00:09:14,810 in Inbar, for example, browsers, safe browsing requests, captive portal requests, crashes and reports. 114 00:09:15,910 --> 00:09:21,460 So don't be disturbed by all these messages caused by these features, but you can disable them. 115 00:09:21,670 --> 00:09:25,600 In fact, I recommend it go to about config. 116 00:09:28,560 --> 00:09:31,130 And confirm the message that pops up. 117 00:09:32,310 --> 00:09:36,530 And change the settings that I'll show you here over on the right side.