I can’t seem to get Burp to intercept traffic when I use nmap as described in the “Proxying Tools” section of the “Using Web Proxies” module.
I have ascertained that Burp is listening on 127.0.0.1:8080, and that intercept is “on”
This is further tested by using curl with proxychains. I do get intercepts that way.
hey man if i rememeber correctly i had to use a regular webisite to scan for this section. For example, instead of using the provided machine IP i used archlinux.org. Hope this helps
The problem seems to persist. I tried for quite a while to solve it, running nmap with --packet-trace shows Errors like: “NSOCK INFO [0.2530s] forward_event(): Forwarding event upstream: TCP connect PROXY ERROR (IOD #3) EID 66”
I think nmap doesn’t use the proxy, it defaults to an other connections.
Maybe zap and burp (I tried both) are not able to properly process nmaps connection or need special configuration to do so.
Sometimes it helps to double-check if Burp is set up as the proxy in the right place within Nmap or Metasploit. Also, make sure any firewall or antivirus isn’t blocking the connection between Nmap/Metasploit and Burp.