Using web proxies module: nmap --proxie command trouble

I can’t seem to get Burp to intercept traffic when I use nmap as described in the “Proxying Tools” section of the “Using Web Proxies” module.

I have ascertained that Burp is listening on 127.0.0.1:8080, and that intercept is “on”
This is further tested by using curl with proxychains. I do get intercepts that way.

I use the following command to scan with Nmap:

nmap --proxies http://127.0.0.1:8080 139.59.177.61 -p31669 -sC -sV

the scan works, but nothing is intercepted by Burp. Nothing in the intercept window, or the http history.

EDIT: Using a proxy in metasploit (as shown in the section example) does the same thing. The scan seems to work, but Burp doesn’t react.

hey man if i rememeber correctly i had to use a regular webisite to scan for this section. For example, instead of using the provided machine IP i used archlinux.org. Hope this helps

The problem seems to persist. I tried for quite a while to solve it, running nmap with --packet-trace shows Errors like: “NSOCK INFO [0.2530s] forward_event(): Forwarding event upstream: TCP connect PROXY ERROR (IOD #3) EID 66”
I think nmap doesn’t use the proxy, it defaults to an other connections.
Maybe zap and burp (I tried both) are not able to properly process nmaps connection or need special configuration to do so.

Sometimes it helps to double-check if Burp is set up as the proxy in the right place within Nmap or Metasploit. Also, make sure any firewall or antivirus isn’t blocking the connection between Nmap/Metasploit and Burp.

I have exacty the same problem, request are just being intercepted by neither burp nor ZAP.
Did anyone solve this problem recently?