Reputation: 1095
BurpSuite can only intercept HTTP traffic. How can I also intercept HTTPS traffic on Ubuntu? I need to install the CA but how?
Upvotes: 13
Views: 44333
Reputation: 371
In Kali linux with Chromium browser this work for me
Note: when i try import directly to chromium with "der" extension the web browser did not recognized the file So the solution was next:
Now we can import the certificate in chromium web browser (The file "PortSwiggerCA.crt"). To import is the same steps for firefox:
Settings -> Search "certificates" -> view certificates -> authorities -> import
Upvotes: 3
Reputation: 6113
You can view detailed instructions of this step here https://support.portswigger.net/customer/portal/articles/1783070-configuring-safari-to-work-with-burp
Make sure you hit OK and Apply
You need to have the proxy enabled to do this. Once it's downloaded, double click on it to install it. Save to login keychain.
Open Keychain Access and search for "portswigger" to find the certificate. Right click and hit "Get Info".
The red Your connection is not private message should be gone now.
Upvotes: 13
Reputation: 1095
Obtaining the certificate:
Install the certificate:
Now, for the step I was missing in other explanations, in the chrome certificate manager in the tab Authorities (where you just imported the certificate), find the newly imported certificate. In my case it looked like this:
Notice the "Untrusted", in my case this meant that it I still got the SSL warnings and the red padlock. Click on "untrusted PortSwigger CA" and click Edit...
Check "Trust this certificate for identifying websites." and click "OK". In my case the text "untrusted" didn't disappear directly but after restarting Chrome, the PortSwigger CA was trusted and SSL proxying works.
If this is a duplicate please tell me, but I haven't found a similar explanation.
Upvotes: 16