- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 67字
- 2021-07-02 12:16:34
Linux or macOS X
To use a proxy on the Linux command line, the environment variables http_proxy, https_proxy, or ftp_proxy have to be set, depending on the traffic type.
To do this effectively, the following commands have to be run:
$ export http_proxy=http://127.0.0.1:8080
$ export https_proxy="https:// 127.0.0.1:8080"
$ export ftp_proxy="http:// 127.0.0.1:8080"
You can check the current proxy settings via the env command:
env | grep -i proxy
推薦閱讀
- RESTful Java Web Services Security
- 云原生安全:攻防實踐與體系構(gòu)建
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- SASE原理、架構(gòu)與實踐
- Kali Linux Social Engineering
- Metasploit Penetration Testing Cookbook(Second Edition)
- 工業(yè)互聯(lián)網(wǎng)安全防護與展望
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 特種木馬防御與檢測技術(shù)研究
- 網(wǎng)絡(luò)安全保障能力研究
- 軟件開發(fā)安全之道:概念、設(shè)計與實施
- 網(wǎng)絡(luò)安全三十六計:人人該懂的防黑客技巧
- 防火墻技術(shù)與應(yīng)用(第2版)
- 網(wǎng)絡(luò)運維親歷記 (網(wǎng)絡(luò)運維紀實文學)
- 硬黑客:智能硬件生死之戰(zhàn)