top of page

Foxyproxy for Burpsuite


Foxyproxy logo image.
Image from https://infatica.io/blog/configure-foxyproxy/

In this blog

➡️ Find my blog on exposing private GraphQL endpoints here.

➡️ Find my blog on exposing private GraphQL fields here.

➡️ Find my blog on exposing private GraphQL posts here.

➡️ Find my blog on GraphQL vulnerabilities here.

Downloading certificates from Burpsuite


First things first, open up Burpsuite and go to the proxy settings.


Click ‘Regenerate CA Certificate' to download the certificate that we will use to allow Portswigger to intercept traffic on our custom browser.

Burpsuite image.
Proxy Tab settings in Burpsuite

Click yes and download the certificate.

To let the new certificate effect take place, restart Burp.

Warning message image.
Regenerating Burp's CA certificate.

Go to Firefox, and search 127.0.0.1:8080, the host address and port that Burp is set to. Click CA Certificate on the right, to download the certificate to the device.

Localhost image.
Downloading the CA certificate from our localhost.

Importing certificates to the local system


Go to Firefox's settings, and go to security. Scroll all the way down to certificates.

Click view certificates.

Firefox settings image.
Firefox certificate settings.

Click import, and find the certificate that you just downloaded.

Firefox certificate manager image.
Firefox certificate manager.

Check the box to trust the CA to identify web sites and click OK. Click OK again to close the certificate manager window.

Firefox certificate image.
Downloading certificate onto Firefox.

Configuring Foxyproxy on Burpsuite and capturing traffic


Go to the Firefox extensions manager and download Foxyproxy. Once downloaded, open the extension and go to options.

 Set title to Burp, hostname as the localhost address and set the port number to 8080 (HTTP). Click save.

Image of Foxyproxy.
Foxyproxy configuration menu.

Open the extension again from the browser toolbar and click ‘Burp’ to start the proxy service. 


Go back to burp and turn intercept to on. It should now be intercepting traffic on the Firefox browser.


If you search for something like Google, it should come up in the Burpsuite Proxy > HTTP history tab. 

Burpsuite image.
Burp capturing traffic.

And that's it! Thanks for reading my blog.


1 Comment

Rated 0 out of 5 stars.
No ratings yet

Add a rating
Guest
Mar 03, 2024
Rated 5 out of 5 stars.

Easy to follow, thank you!

Like
  • GitHub
  • Twitter
  • LinkedIn
bottom of page