You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+12-5Lines changed: 12 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -45,13 +45,13 @@ This non-HTTP proxy has several features built in.
45
45
- Use python code to reformat requests in history without changing outgoing or incomming requests. (e.g. Convert protobuf to JSON or human readable formats without modifying the incomming or outgoing traffic)
46
46
47
47
48
-
## TCP Repeater
48
+
## TCP/UDP Repeater
49
49
50
50

51
51
52
-
- TCP repeater can be used to replay requests to the client or server on the currently connected socket streams.
52
+
- TCP/UDP repeater can be used to replay requests to the client or server on the currently connected socket streams.
53
53
- Code Playground allows you to create a custom python payload based on the request currently displayed in the repeater.
54
-
- Search TCP proxy History
54
+
- Search TCP/UDP proxy history
55
55
56
56
## Configure the proxies
57
57
@@ -64,9 +64,11 @@ Once you know the right host name and port you can configure these settings as s
64
64
The proxy does not start until ‘enable’ is checked in the table.
65
65
66
66
Once the proxy is started you can intercept it in real time. All your traffic will be logged into the TCP History Tab and stored locally in a sqlite database. The database can be exported or imported from the Server Configuration Tab. In addition, if Burp crashes or you close burp without saving the TCP History it will still be automatically loaded when you start Burp.
67
+
67
68
## Manual Intercept Traffic
68
69

69
70
Clicking on the TCP Intercept Tab will allow to enable and disable Manual Intercepting. This will be very similar to intercepting HTTP traffic with burp. If the data sent is just strings then it’s very simple to just replace text or attempt modification to the request. If the application is sending serialized objects or protobuffs then you will need to switch between Raw and Hex mode to ensure the data is encoded correctly and length checks are correct.
71
+
70
72
## Automated Manipulation of Traffic
71
73
Once you have your ideal payload you can automatically match and replace in the Automation Tab.
72
74

@@ -126,12 +128,17 @@ Now we use the pre and post interceptor functions to make it easier to modify in
126
128
127
129
Below is an example of the now Human Readable and Editable Protobufs.
128
130
129
-

131
+
A
132
+
133
+
## Highlighting Traffic
134
+
You can select mutliple requests and responses and highlight them with custom colors. You can even search only highlighted items. This makes is easy to find interesting requests later that you might want to dig into further.
0 commit comments