![]() ![]() Redirecting to localhost works: rdr pass on bridge100 inet proto tcp from any to any port -> 172.16.122. Then I want to forward all traffic to the Burp proxy, which is at 172.16.122.128:8080. I enabled "Internet Sharing" on my Macbook so my phone now connects to the laptop using WiFi. To do so, I want to intercept all WiFi traffic and forward it to Burp, which runs in a VM. I'll be glad to provide any additional details.I want to pentest a mobile application. Right now I'm not sure what is causing the redirect to HTTPS to go to the IP and not the hostname. Look at your iptables: sudo iptables -L -n. Ping both to make sure they both get a good response under: Chain FORWARD (policy ACCEPT) target prot opt source destination. # violate open standards by misusing DNT (DNT *must* be a specific Try double checking that your loopback ip address (127.0.0.1) is setup to reach localhost. # uncomment out the below to deal with user agents that deliberately Here is the last portion of the nf file: I've set the `ServerName` in the nf file to be the :80 rather than 127.0.0.1:80, which is what it was before. It looks like part of the `nf` file should be acting as the section, but it doesn't explicitly state any redirects that I would usually see for a webserver preferring HTTPS. In the `nf` file, it's not using a VirtualHost block for :80, and it's not even using an include for `nf`. Ive looked through the Apache conf files. What is happening when I visit is it will redirect me to (the IP of the server). ![]() The web application is built on Apache2.4. I'm trying to reverse engineer the webserver portion of an application our department relies on.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |