If you don't know what that means or what a man-in-the-middle is, don't worry about it, we'll get into it. After this lesson, you'll be able to describe what a man-in-the-middle attack is, using the Burp Suite proxy to man-in-the-middle your traffic, and finally modify that traffic as it's on its way back to the server. Intercepting HTTPS traffic with Burp Suite; Man-in-the-middle attack: Real-life example and video walkthrough Updated 2021 Decrypting SSL/TLS traffic with Wireshark updated 2021 Dumping a complete database using SQL injection updated 2021 Hacking clients with WPAD (web proxy auto-discovery) protocol updated 2021.
In Part 1 of this series, I walked through an introduction to Postman, a popular tool for API developers that makes it easier to test API calls. We created a collection, and added a request to it. We also talked about how Postman handles cookies – which is essentially the same way a browser does. In this part, we’ll tailor it a bit more toward penetration testing, by proxying Postman through Burp. And in the upcoming parts 3 and 4, we’ll deal with more advanced usage of Postman, and using Burp Extensions to augment Postman, respectively.
By using Postman, we have its benefits as a superior tool for crafting requests from scratch, and managing them. By proxying it through Burp, we gain its benefits: we can fuzz with intruder, we have the passive scanner highlighting issues for us, we can leverage Burp extensions as we will see in Part 4 of this series. And we can use Repeater for request tampering. Yes, it’s true that we could do our tampering in Postman. There are two strong reasons to use Repeater for it: 1) Postman is designed to issue correct, valid requests. Under some circumstances, it will try to correct malformed syntax. When testing for security issues, we may not want it trying to correct us. 2) By using Repeater, we maintain a healthy separation between our clean-state request in Postman, and our tampered requests in Repeater.
Setting up Burp Suite
An actual introduction to burp is outside the scope of this particular post. If you’re reading this, it’s likely you’re already familiar with it – we aren’t doing anything exotic or different for API testing.
If you’re unfamiliar with it, here are some resources:
- The official website – There’s a community edition available for download, the pro version is quite affordable as wellhttps://portswigger.net/
- Tactical Burp Suite– Our 2-hour recorded class, now freehttps://youtu.be/DFnxptySDgI
- Burp Suite: Continuing the Saga– My teammate Larry’s recent post on Burp Suite/2018/03/burp-suite-continuing-the-saga.html
Now, launch Burp, check the Proxy -> Options tab.
The top section is Proxy Listeners, and you should see a listener on 127.0.0.1, port 8080. It must be Running (note the checkbox). If it’s not running by default, that typically means the port is not available, and you will want to change the listener (and Postman) to a different port. As long as Burp is listening on the same port Postman is trying to proxy through, your setup should work.
Also check the Proxy -> Intercept tab and verify that Intercept is off.
Configuring Postman to Proxy through Burp
Postman is proxy-aware, which means we want to point it at our man-in-the-middle-proxy, which is Burp Suite (my tool of choice) for this post. We’ll open the Settings dialog by clicking the Wrench icon in the top-right (1) and then Settings option on its drop-down menu (2).
This will open a large Settings dialog with tabs across the top for the different categories of settings. Locate the Proxy tab and click it to navigate.
There are 3 things to do on this tab:
Burp Suite Man In The Middle Ages
- Turn On the Global Proxy Configuration switch.
- Turn Off the Use System Proxy switch.
- Set the Proxy Server IP address and port to match your Burp Suite proxy interface.
The default proxy interface will be 127.0.0.1, port 8080 assuming you are running Burp Suite on the same machine as Postman. If you want to use a different port, you will need to specify it here and make sure it’s set to match the proxy interface in Burp.
Now that you are able to proxy traffic, there’s one more hurdle to consider. Today, SSL/TLS is used on most public APIs. This is a very good thing, but it means when Burp man-in-the-middles the Postman’s API requests and responses, you will get certificate errors unless your Burp Certificate Authority is trusted by your system. There are two options to fix this:
- You can turn off certificate validation in Postman. Under the General settings tab, there’s an SSL certification verification option. Setting it to Off will make Postman ignore any certificate issues, including the fact that your Burp Suite instance’s PortSwigger CA is untrusted.
- You can trust your Burp Suite CA to your system trust store. The specifics of how to do this are platform specific.
PortSwigger’s documentation for it is here: https://support.portswigger.net/customer/portal/articles/1783075-Installing_Installing%20CA%20Certificate.html
Verify that it is working
Issue some requests in Postman. Check your HTTP History on the Proxy tab in Burp.
Burp Suite Tools
- Your request is stalling and timing out? Verify that Intercept is Off on the Proxy tab in Burp. Check that your proxy settings in Postman match the Proxy Interface in Burp.
- Postman is getting responses but they aren’t showing in the Proxy History (etc) in Burp? Check the Settings in Postman to verify that Global Proxy Config is turned on. Make sure you haven’t activated a filter on the History in Burp that would filter out all of your requests. Also make sure your scope is set, if you’re not capturing out-of-scope traffic.
Burp Suite Man In The Middle Age
So this was two posts of pretty elementary setup type activity. Now that we have our basic tool-chain setup, we’re ready for some more advanced stuff. Part 3 will deal with variables in Postman, and how they can simplify your life. It will also dig into the scripting interface, and how to use it to simplify interactions with more common, modern approaches to Auth, such as Bearer tokens.