- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 197字
- 2021-06-24 18:44:59
Burp Proxy with HTTPS websites
Burp Proxy also works with HTTPS websites. In order to decrypt the communication and be able to analyze it, Burp Proxy intercepts the connection, presents itself as the web server, and issues a certificate that is signed by its own SSL/TLS Certificate Authority (CA). The proxy then presents itself to the actual HTTPS website as the user, and it encrypts the request with the certificate provided by the web server. The connection from the web server is then terminated at the proxy that decrypts the data and re-encrypts it with the self-signed CA certificate, which will be displayed on the user's web browser. The following diagram explains this process:

The web browser will display a warning, as the certificate is self-signed and not trusted by the web browser. You can safely add an exception to the web browser, since you are aware that Burp Proxy is intercepting the request and not a malicious user. Alternatively, you can export Burp's certificate to a file by clicking on the corresponding button in Proxy Listeners by going to Proxy | Options and then import the certificate into the browser and make it a trusted one:

- Linux網絡管理與配置(第2版)
- 鴻蒙生態:開啟萬物互聯的智慧新時代
- 阿里云數字新基建系列:云原生操作系統Kubernetes
- Haskell Financial Data Modeling and Predictive Analytics
- Windows Server 2019 Administration Fundamentals
- 細說Linux基礎知識
- Application Development in iOS 7
- 深入淺出Node.js
- AWS SysOps Cookbook
- Windows 7使用詳解(修訂版)
- UI設計手繪表現從入門到精通
- Learning Continuous Integration with Jenkins(Second Edition)
- 鴻蒙HarmonyOS應用開發入門
- 辦公自動化教程(Windows7+Office2010)
- Windows 8完全自學手冊