Burp's Invisible Proxy
- by Vince
-
in Blog
-
Hits: 1651
As I like to do in my spare time, I work on vulnerable machines for my continuing education. The vuln box W1R3S: 1.0.1 crossed my path and I uncovered a previously seen entry point with a new twist. Aside from this new twist, if you've come in through this door, you know how to get through, you just have to work it a little more than the previous times you've seen it. I'm going to leave it at that because this isn't a walk-through and I'm probably spoiling too much already.
While enumerating the box, I saw what I believe to be an intentional rabbit hole and it seemed like a great way to play around with Burp's Invisible Proxy.
Starting from the beginning, we kick off with an Nmap scan: