Send CLI-based Web Traffic via Burp

Hi NetSec,

Something I've found myself scratching my head over recently, yet can't seem to get working properly. I am running a CLI application written in .NET that makes web requests. I'd like to be able to view, intercept and/or modify these requests via Burp.

I have Burp listening on localhost on the usual 8080 port. I have tried setting the proxy settings in the command line with 'netsh winhttp set proxy "127.0.0.1:8080", which didn't seem to work, I've tried setting the system proxy (Start > Proxy Settings > 127.0.0.1 8080) which also doesn't seem to work. I've tried using Proxifier and set a rule for Powershell / CMD to push traffic through 127.0.0.1 8080 which also doesn't work.

Does anyone have a method for getting this traffic pushed through to Burp?

Touch here for the full post on Network Security Noblemen tumblr

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s