![]() We configure Kali Linux as a proxy-aware router. ![]() To maximize portability, we implement the above set-up on a Raspberry Pi. Situations where an intercepting router is useful include complex scenarios where many devices and applications interact with each other, such as an embedded device that interacts with a web service, but that can also be configured via a mobile and a windows application. In this article, we describe how to set up Kali Linux to sniff TCP/ UDP traffic of any device, app, or application by configuring Kali as an intercepting router that can forward specific traffic to a transparent proxy on a different machine, such as HTTP(S) traffic to BurpSuite. For devices or applications that are not proxy-aware, intercepting traffic is more challenging. For devices or applications that are proxy-aware, interception of traffic is straightforward: we configure the application or device to use our proxy, such as BurpSuite, and go on with our lives. Many of us regularly sniff or intercept traffic coming from embedded devices, mobile apps, or windows applications. Intercepting Communication from Embedded Devices, Android Apps, and Windows Applications.We assume that you own an Ethernet LAN Network USB Adapter and a wireless B/G/N USB adapter. Read A Raspberry Pi Kali Router if you want to run this on a Raspberry Pi. Read Setup and Automation to configure your Kali Linux machine and run the scripts. sends HTTP and HTTPS traffic to an intercepting proxy, such as BurpSuite, running on another machine. ![]() This repository contains code to turn your Kali Linux machine into a router
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |