

In the following screenshot, the line marked in red arrow shows the last request. In this case, it is metasploitable machine with IP 192.168.1.102

To start interception, go to Proxy → Intercept → click “Intercept is on”.Ĭontinue to navigate on the webpage that you want to find the parameter to test for vulnerabilities. Then configure the browser proxy which is the IP of burpsuite machine and the port. In this case, the proxy IP will be 127.0.0.1 with port 8080. To do this, go to Options as shown in the following screenshot. To make the setup of sniffing, we configure burpsuite to behave as a proxy. To open Burpsuite, go to Applications → Web Application Analysis → burpsuite. Burpsuiteīurpsuite can be used as a sniffing tool between your browser and the webservers to find the parameters that the web application uses. In this chapter, we will learn about the sniffing and spoofing tools available in Kali. The basic concept of sniffing tools is as simple as wiretapping and Kali Linux has some popular tools for this purpose.
