{"id":25929,"date":"2022-07-25T15:04:11","date_gmt":"2022-07-25T15:04:11","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=25929"},"modified":"2022-07-25T15:04:12","modified_gmt":"2022-07-25T15:04:12","slug":"mitm_intercept","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/","title":{"rendered":"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify non-HTTP Protocols Through Burp And Others"},"content":{"rendered":"\n<p><strong>MITM_Intercept<\/strong>  is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS interception support. This tool is for researchers and applicative penetration testers that perform thick clients security assesments.<\/p>\n\n\n\n<p>An improved version of the fantastic&nbsp;mitm_relay&nbsp;project.<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cyberark\/MITM_Intercept#the-story\"><\/a>The Story<\/h2>\n\n\n\n<p>As part of our work in the research department of CyberArk Labs, we needed a way to inspect SSL and TLS communication over TCP and have the option to modify the content of packets on the fly. There are many ways to do so (for example, the known Burp Suite extension&nbsp;NoPE), but none of them worked for us in some cases. In the end we stumbled upon&nbsp;mitm_relay.<\/p>\n\n\n\n<p>mitm_relay is a quick and easy way to perform MITM of any TCP-based protocol through existing HTTP interception software like Burp Suite\u2019s proxy. It is particularly useful for thick clients security assessments. But it didn\u2019t completely work for us, so we needed to customize it. After a lot of customizations, every new change required a lot of work, and we ended up rewriting everything in a more modular way.<\/p>\n\n\n\n<p>We hope that others will find this script helpful, and we hope that adding functionality will be easy.<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cyberark\/MITM_Intercept#how-does-it-work\"><\/a>How does it work<\/h2>\n\n\n\n<p>For a start, listeners\u2019 addresses and ports need to be configured. For each listener, there also needs to be a target configured (address and port). Every data received from the listener will be wrapped into a body of an HTTP POST request with the URL containing \u201cCLIENT_REQUEST\u201d. Every data received from the target will be wrapped into a body of an HTTP POST request with the URL containing \u201cSERVER_RESPONSE\u201d. Those requests are sent to a local HTTP interception server.<\/p>\n\n\n\n<p>There is the option to configure an HTTP proxy and use a tool like&nbsp;burp suite&nbsp;as an HTTP interception tool and view the messages there. This way, it is easy to modify the messages by using Burp\u2019s \u201cMatch and Replace\u201d, extensions or even manually (Remember, the timeout mechanism of the intercepted protocol can be very short).<\/p>\n\n\n\n<p>Another way to modify the messages is by using a python script that the HTTP interception server will run when it receives messages.<\/p>\n\n\n\n<p>The body of the messages sent to the HTTP interception server will be printed to the shell. The messages will be printed after the changes if the modification script is given. After all the modifications, the interception server will also echo back as an HTTP response body.<\/p>\n\n\n\n<p>To decrypt the SSL\/TLS communication, mitm_intercept need to be provided a certificate and a key that the client will accept when starting a handshake with the listener. If the target server requires a specific certificate for a handshake, there is an option to give a certificate and a key.<\/p>\n\n\n\n<p>A small chart to show the typical traffic flow:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOzc8PK56sjKtR8fh-FJM1qoAm-C1p8YgvOuuLNxOrf0uPmHnevlP2DQsXWcYX_Mzxhfhg0TK5QQ-_zHfIvzZ4jp3rEO6fHKFGkjCIVxTqN9IP-MTh_f-dRwtjOGJ5S29Qih1Wj-nsEv98WYWx-6eos3fTYCdJRoEJ5qdaeHpy-MnmOeUNjBpDa59Q\/s741\/162932536-c720802f-2523-4b62-902c-df0fa2a2ca0d.jpg\" alt=\"\" \/><\/figure>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\">Differences from mitm_relay<\/h2>\n\n\n\n<p>mitm_intercept is compatible with newer versions of python 3 (python 3.9) and is also compatible with windows (socket.MSG_DONTWAIT does not exist in windows, for example). We kept the option of using \u201cSTARTTLS,\u201d and we called it \u201cMixed\u201d mode. Using the SSL key log file is updated (the built-in option to use it is new from python 3.8), and we added the option to change the&nbsp;sni header. Now, managing incoming and outgoing communication is done by&nbsp;socketserver, and all the data is sent to a subclass of&nbsp;ThreadingHTTPServer&nbsp;that handle the data representation and modification. This way, it is possible to see the changes applied by the modification script in the response (convenient for using Burp). Also, we can now change the available ciphers that the script uses using the&nbsp;OpenSSL cipher list format<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cyberark\/MITM_Intercept#prerequisites\"><\/a>Prerequisites<\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li>Python 3.9<\/li><li>requests:&nbsp;<code><strong>$ python -m pip install requests<\/strong><\/code><\/li><\/ol>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Usage<\/h2>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>usage: mitm_intercept.py [-h] [-m] -l [u|t:]: [[u|t:]: \u2026] -t<br>[u|t:]: [[u|t:]: \u2026] [-lc ]<br>[-lk ] [-tc ] [-tk ] [-w :]<br>[-p :] [-s ] [&#8211;sni ]<br>[-tv ] [-ci ]<br>mitm_intercept version 1.6<br>options:<br>-h, &#8211;help show this help message and exit<br>-m, &#8211;mix-connection Perform TCP relay without SSL handshake. If one of the relay sides starts an<br>SSL handshake, wrap the connection with SSL, and intercept the<br>communication. A listener certificate and private key must be provided.<br>-l [u|t:]: [[u|t:]: \u2026], &#8211;listen [u|t:]: [[u|t:]: \u2026]<br>Creates SSLInterceptServer listener that listens on the specified interface<br>and port. Can create multiple listeners with a space between the parameters.<br>Adding &#8220;u:&#8221; before the address will make the listener listen in UDP<br>protocol. TCP protocol is the default but adding &#8220;t:&#8221; for cleanliness is<br>possible. The number of listeners must match the number of targets. The i-th<br>listener will relay to the i-th target.<br>-t [u|t:]: [[u|t:]: \u2026], &#8211;target [u|t:]: [[u|t:]: \u2026]<br>Directs each SSLInterceptServer listener to forward the communication to a<br>target address and port. Can create multiple targets with a space between<br>the parameters. Adding &#8220;u:&#8221; before the address will make the target<br>communicate in UDP protocol.TCP protocol is the default but adding &#8220;t:&#8221; for<br>cleanliness is possible. The number of listeners must match the number of<br>targets. The i-th listener will relay to the i-th target.<br>-lc , &#8211;listener-cert<br>The certificate that the listener uses when a client contacts him. Can be a<br>self-sign certificate if the client will accept it.<br>-lk , &#8211;listener-key<br>The private key path for the listener certificate.<br>-tc , &#8211;target-cert<br>The certificate that used to create a connection with the target. Can be a<br>self-sign certificate if the target will accept it. Doesn&#8217;t necessary if the<br>target doesn&#8217;t require a specific certificate.<br>-tk , &#8211;target-key<br>The private key path for the target certificate.<br>-w :, &#8211;webserver :<br>Specifies the interface and the port the InterceptionServer webserver will<br>listens on. If omitted the default is 127.0.0.1:49999<br>-p :, &#8211;proxy :<br>Specifies the address and the port of a proxy between the InterceptionServer<br>webserver and the SSLInterceptServer. Can be configured so the communication<br>will go through a local proxy like Burp. If omitted, the communication will<br>be printed in the shell only.<br>-s , &#8211;script<br>A path to a script that the InterceptionServer webserver executes. Must<br>contain the function handle_request(message) that will run before sending it<br>to the target or handle_response(message) after receiving a message from the<br>target. Can be omitted if doesn&#8217;t necessary.<br>&#8211;sni If there is a need to change the server name in the SSL handshake with the<br>target. If omitted, it will be the server name from the handshake with the<br>listener.<br>-tv , &#8211;tls-version<br>If needed can be specified a specific TLS version.<br>-ci , &#8211;ciphers<br>Sets different ciphers than the python defaults for the TLS handshake. It<br>should be a string in the OpenSSL cipher list format<br>(https:\/\/www.openssl.org\/docs\/manmaster\/man1\/ciphers.html).<br>For dumping SSL (pre-)master secrets to a file, set the environment variable SSLKEYLOGFILE with a<br>file path. Useful for Wireshark.<\/strong><\/p>\n\n\n\n<p>The communication needs to be directed to the listener for intercepting arbitrary protocols. The way to do so depends on how the client operates. Sometimes it uses a DNS address, and changing the hosts file will be enough to resolve the listener address. If the address is hard-coded, then more creative ways need to be applied (usually some modifications of the routing table, patching the client, or&nbsp;using VM and iptables).<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/cyberark\/MITM_Intercept#modification-script\"><\/a>Modification Script<\/h2>\n\n\n\n<p>The HTTP interception server can run a script given to it with the flag&nbsp;<strong><code>-s<\/code>.<\/strong> This script runs when the HTTP requests are received. The response from the HTTP interception server is the received request after running the script.<\/p>\n\n\n\n<p>When a proxy is configured (like Burp), modifications of the request will happen before the script runs, and modifications on the response will be after that. Alterations on the request and the response by the proxy or the modification script will change the original message before going to the destination.<\/p>\n\n\n\n<p>The script must contain the functions&nbsp;<code><strong>handle_request(message)<\/strong><\/code>&nbsp;and&nbsp;<code><strong>handle_response(message)<\/strong><\/code>. The HTTP interception server will call&nbsp;<code><strong>handle_request(message)<\/strong><\/code>&nbsp;when the message is from the client to the server and&nbsp;<code><strong>handle_response(message)<\/strong><\/code>&nbsp;when the message is from the server to the client.<\/p>\n\n\n\n<p>An example of a script that adds a null byte at the end of the message:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>def handle_request(message):<br>return message + b&#8221;\\x00&#8243;<br>def handle_response(message):<br># Both functions must return a message.<br>return message<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/cyberark\/MITM_Intercept\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MITM_Intercept is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS interception support. This tool is for researchers and applicative penetration testers that perform thick clients security assesments. An improved version of the fantastic&nbsp;mitm_relay&nbsp;project. The Story As part of our work in the research [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5466,5467,5465],"class_list":["post-25929","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-hackish","tag-http-protocols","tag-mitm_intercept"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify<\/title>\n<meta name=\"description\" content=\"MITM_Intercept is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify\" \/>\n<meta property=\"og:description\" content=\"MITM_Intercept is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-25T15:04:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-25T15:04:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify non-HTTP Protocols Through Burp And Others\",\"datePublished\":\"2022-07-25T15:04:11+00:00\",\"dateModified\":\"2022-07-25T15:04:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/\"},\"wordCount\":1376,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png\",\"keywords\":[\"Hackish\",\"HTTP Protocols\",\"MITM_Intercept\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/\",\"name\":\"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png\",\"datePublished\":\"2022-07-25T15:04:11+00:00\",\"dateModified\":\"2022-07-25T15:04:12+00:00\",\"description\":\"MITM_Intercept is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify","description":"MITM_Intercept is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/","og_locale":"en_US","og_type":"article","og_title":"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify","og_description":"MITM_Intercept is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS.","og_url":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-07-25T15:04:11+00:00","article_modified_time":"2022-07-25T15:04:12+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify non-HTTP Protocols Through Burp And Others","datePublished":"2022-07-25T15:04:11+00:00","dateModified":"2022-07-25T15:04:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/"},"wordCount":1376,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","keywords":["Hackish","HTTP Protocols","MITM_Intercept"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/","url":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/","name":"MITM_Intercept : A Little Bit Less Hackish Way To Intercept And Modify","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","datePublished":"2022-07-25T15:04:11+00:00","dateModified":"2022-07-25T15:04:12+00:00","description":"MITM_Intercept is a little bit less hackish way to intercept and modify non-HTTP protocols through Burp and others with SSL and TLS.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/mitm_intercept\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/mitm_intercept\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh259XKa2ZeVsxxk_SrjGxLL1vTczyQPQZM95OMdDwYUAQNSnsJbUNtF-vGE2jn0MHWlU0-eTaTt0gv9TlcW4pU7iqz2e8qOVXCXNcDy394CsO4vbPt3wIoQidKYOj32N3sPvzCIdmwmMlOWGCETxRcXl-hhcu9_Vb6m8UY86GcI4_-6UqXY_utx5tz\/s728\/MITM_Intercept_1-769093%20(2).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":34060,"url":"https:\/\/kalilinuxtutorials.com\/bypass-bot-detection\/","url_meta":{"origin":25929,"position":0},"title":"Bypass Bot Detection &#8211; Enhancing Burp Suite With TLS Cipher Mutation","author":"Varshini","date":"July 31, 2024","format":false,"excerpt":"In the ever-evolving landscape of cybersecurity, staying ahead of detection mechanisms is crucial. This article explores a Burp Suite extension that ingeniously mutates TLS ciphers to bypass TLS fingerprint-based bot detection. Learn how to install and leverage this tool to enhance your security testing capabilities effectively. Burp Suite extension that\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEias9cD_QqAg64P6C-VElDbNtYKJSOpS9qqkdYNAgYJvYbrQxpIdpMivOOcYCLzCXWqWuTcMbnaOZxxuntdh_oWhg7mChWguqqF0_DuvcFuq_8g-kuGKTCnwOxoNRmODTBrMBpHYnikPNlvIRFWvwfGWrLfVG-ffHgSIuDwscCp5kv4p7nzQkw-sQikeQxd\/s16000\/Bypass%20Bot%20Detection.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEias9cD_QqAg64P6C-VElDbNtYKJSOpS9qqkdYNAgYJvYbrQxpIdpMivOOcYCLzCXWqWuTcMbnaOZxxuntdh_oWhg7mChWguqqF0_DuvcFuq_8g-kuGKTCnwOxoNRmODTBrMBpHYnikPNlvIRFWvwfGWrLfVG-ffHgSIuDwscCp5kv4p7nzQkw-sQikeQxd\/s16000\/Bypass%20Bot%20Detection.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEias9cD_QqAg64P6C-VElDbNtYKJSOpS9qqkdYNAgYJvYbrQxpIdpMivOOcYCLzCXWqWuTcMbnaOZxxuntdh_oWhg7mChWguqqF0_DuvcFuq_8g-kuGKTCnwOxoNRmODTBrMBpHYnikPNlvIRFWvwfGWrLfVG-ffHgSIuDwscCp5kv4p7nzQkw-sQikeQxd\/s16000\/Bypass%20Bot%20Detection.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEias9cD_QqAg64P6C-VElDbNtYKJSOpS9qqkdYNAgYJvYbrQxpIdpMivOOcYCLzCXWqWuTcMbnaOZxxuntdh_oWhg7mChWguqqF0_DuvcFuq_8g-kuGKTCnwOxoNRmODTBrMBpHYnikPNlvIRFWvwfGWrLfVG-ffHgSIuDwscCp5kv4p7nzQkw-sQikeQxd\/s16000\/Bypass%20Bot%20Detection.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEias9cD_QqAg64P6C-VElDbNtYKJSOpS9qqkdYNAgYJvYbrQxpIdpMivOOcYCLzCXWqWuTcMbnaOZxxuntdh_oWhg7mChWguqqF0_DuvcFuq_8g-kuGKTCnwOxoNRmODTBrMBpHYnikPNlvIRFWvwfGWrLfVG-ffHgSIuDwscCp5kv4p7nzQkw-sQikeQxd\/s16000\/Bypass%20Bot%20Detection.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEias9cD_QqAg64P6C-VElDbNtYKJSOpS9qqkdYNAgYJvYbrQxpIdpMivOOcYCLzCXWqWuTcMbnaOZxxuntdh_oWhg7mChWguqqF0_DuvcFuq_8g-kuGKTCnwOxoNRmODTBrMBpHYnikPNlvIRFWvwfGWrLfVG-ffHgSIuDwscCp5kv4p7nzQkw-sQikeQxd\/s16000\/Bypass%20Bot%20Detection.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33722,"url":"https:\/\/kalilinuxtutorials.com\/awesome-tls\/","url_meta":{"origin":25929,"position":1},"title":"Awesome TLS &#8211; Evading WAFs With Advanced Burp Suite Extension","author":"Varshini","date":"July 9, 2024","format":false,"excerpt":"This extension hijacks Burp's HTTP and TLS stack, allowing you to spoof any browser TLS fingerprint (JA3). It boosts the power of Burp Suite while reducing the likelihood of fingerprinting by various WAFs like CloudFlare, PerimeterX, Akamai, DataDome, etc. It does this without resorting to hacks, reflection or forked Burp\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhEPj30JqhrG9_FywDLsmkkBniYgXoPkxZA5PfzLbFUUpCZ4lC6gOqsKXg0JSCJuo7mnEIzbd9sSW6k-J-AnkcL2_vzZSR7enaR17N7CyXDUZDZlozgWQ8Z3TzQIa0DjYhc2FN94TLKkeY_jMAc43Ycre2zLlHIyPYDOL9z8GMS4fF-bi2jzji_h5ubv56C\/s16000\/Awesome%20TLS.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhEPj30JqhrG9_FywDLsmkkBniYgXoPkxZA5PfzLbFUUpCZ4lC6gOqsKXg0JSCJuo7mnEIzbd9sSW6k-J-AnkcL2_vzZSR7enaR17N7CyXDUZDZlozgWQ8Z3TzQIa0DjYhc2FN94TLKkeY_jMAc43Ycre2zLlHIyPYDOL9z8GMS4fF-bi2jzji_h5ubv56C\/s16000\/Awesome%20TLS.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhEPj30JqhrG9_FywDLsmkkBniYgXoPkxZA5PfzLbFUUpCZ4lC6gOqsKXg0JSCJuo7mnEIzbd9sSW6k-J-AnkcL2_vzZSR7enaR17N7CyXDUZDZlozgWQ8Z3TzQIa0DjYhc2FN94TLKkeY_jMAc43Ycre2zLlHIyPYDOL9z8GMS4fF-bi2jzji_h5ubv56C\/s16000\/Awesome%20TLS.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhEPj30JqhrG9_FywDLsmkkBniYgXoPkxZA5PfzLbFUUpCZ4lC6gOqsKXg0JSCJuo7mnEIzbd9sSW6k-J-AnkcL2_vzZSR7enaR17N7CyXDUZDZlozgWQ8Z3TzQIa0DjYhc2FN94TLKkeY_jMAc43Ycre2zLlHIyPYDOL9z8GMS4fF-bi2jzji_h5ubv56C\/s16000\/Awesome%20TLS.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhEPj30JqhrG9_FywDLsmkkBniYgXoPkxZA5PfzLbFUUpCZ4lC6gOqsKXg0JSCJuo7mnEIzbd9sSW6k-J-AnkcL2_vzZSR7enaR17N7CyXDUZDZlozgWQ8Z3TzQIa0DjYhc2FN94TLKkeY_jMAc43Ycre2zLlHIyPYDOL9z8GMS4fF-bi2jzji_h5ubv56C\/s16000\/Awesome%20TLS.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhEPj30JqhrG9_FywDLsmkkBniYgXoPkxZA5PfzLbFUUpCZ4lC6gOqsKXg0JSCJuo7mnEIzbd9sSW6k-J-AnkcL2_vzZSR7enaR17N7CyXDUZDZlozgWQ8Z3TzQIa0DjYhc2FN94TLKkeY_jMAc43Ycre2zLlHIyPYDOL9z8GMS4fF-bi2jzji_h5ubv56C\/s16000\/Awesome%20TLS.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10532,"url":"https:\/\/kalilinuxtutorials.com\/burp-extension\/","url_meta":{"origin":25929,"position":2},"title":"Generator Burp Extension : Everything You Need About","author":"R K","date":"May 10, 2020","format":false,"excerpt":"When you generate your plugin project, the generator will ask you what features should be included in your plugin. If you are familiarized with burp extension developing, the names of the features will be descriptive enough, but, if you are new in burp extensions, here is a short description of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10345,"url":"https:\/\/kalilinuxtutorials.com\/burp-exporter\/","url_meta":{"origin":25929,"position":3},"title":"Burp-Exporter : Request To Clipboard With Multiple Programming Languages Functions","author":"R K","date":"April 21, 2020","format":false,"excerpt":"Burp-Exporter is a Burp Suite extension to copy a request to the clipboard as multiple programming languages functions. You can export as:cURLWgetPython RequestPerl LWPPHP HTTP_Request2Go NativeNodeJS RequestjQuery AJAXPowerShell Also Read - Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations Requirements Jython >= 2.7.1 Burp Suite import In Burp\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":497,"url":"https:\/\/kalilinuxtutorials.com\/burpsuite\/","url_meta":{"origin":25929,"position":4},"title":"Burp Suite Tutorial &#8211; A Web Application Penetration Testing Tool &#8211; Beginners Guide","author":"Ravi Sankar","date":"December 15, 2022","format":false,"excerpt":"In this Burp Suite Tutorial, we are going to elaborately describe the Burp Suite tool and its features that are bundled in a single suite made for Web Application Security assessment as well as Penetration testing. It's a java executable and hence it's cross-platform. Kali Linux comes with Burp Suite\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdti5EhOcq36yE_PBTkvUc5oLuE6vTeauicRzHsdJA32h_AquFi5JnkgxE85HuxDU-flufRAi-YmChDGFnpWHcxxat0CYYXiVfCPciQtgUKhcc_PrgLGpWbmJy20SXUZp-leAyDZHMEWaF2wKpa05-aHSIMeX_njAn2OiBqhllQ40dTYWFR1YYu_Xa\/s16000\/Burp%20Suite%20Tutorial.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdti5EhOcq36yE_PBTkvUc5oLuE6vTeauicRzHsdJA32h_AquFi5JnkgxE85HuxDU-flufRAi-YmChDGFnpWHcxxat0CYYXiVfCPciQtgUKhcc_PrgLGpWbmJy20SXUZp-leAyDZHMEWaF2wKpa05-aHSIMeX_njAn2OiBqhllQ40dTYWFR1YYu_Xa\/s16000\/Burp%20Suite%20Tutorial.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdti5EhOcq36yE_PBTkvUc5oLuE6vTeauicRzHsdJA32h_AquFi5JnkgxE85HuxDU-flufRAi-YmChDGFnpWHcxxat0CYYXiVfCPciQtgUKhcc_PrgLGpWbmJy20SXUZp-leAyDZHMEWaF2wKpa05-aHSIMeX_njAn2OiBqhllQ40dTYWFR1YYu_Xa\/s16000\/Burp%20Suite%20Tutorial.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdti5EhOcq36yE_PBTkvUc5oLuE6vTeauicRzHsdJA32h_AquFi5JnkgxE85HuxDU-flufRAi-YmChDGFnpWHcxxat0CYYXiVfCPciQtgUKhcc_PrgLGpWbmJy20SXUZp-leAyDZHMEWaF2wKpa05-aHSIMeX_njAn2OiBqhllQ40dTYWFR1YYu_Xa\/s16000\/Burp%20Suite%20Tutorial.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25824,"url":"https:\/\/kalilinuxtutorials.com\/stunner\/","url_meta":{"origin":25929,"position":5},"title":"Stunner : Tool To Test And Exploit STUN, TURN And TURN Over TCP Servers","author":"R K","date":"July 6, 2022","format":false,"excerpt":"Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers. TURN is a protocol mostly used in videoconferencing and audio chats (WebRTC). If you find a misconfigured server you can use this tool to open a local socks proxy that relays all traffic via the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-p33BS4dO5TA\/YOVAj022AzI\/AAAAAAAAJ5g\/1MUPHEogapM4TL6fotueMZvu3zKQxHvhwCLcBGAsYHQ\/s905\/scour-demo.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-p33BS4dO5TA\/YOVAj022AzI\/AAAAAAAAJ5g\/1MUPHEogapM4TL6fotueMZvu3zKQxHvhwCLcBGAsYHQ\/s905\/scour-demo.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-p33BS4dO5TA\/YOVAj022AzI\/AAAAAAAAJ5g\/1MUPHEogapM4TL6fotueMZvu3zKQxHvhwCLcBGAsYHQ\/s905\/scour-demo.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-p33BS4dO5TA\/YOVAj022AzI\/AAAAAAAAJ5g\/1MUPHEogapM4TL6fotueMZvu3zKQxHvhwCLcBGAsYHQ\/s905\/scour-demo.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=25929"}],"version-history":[{"count":10,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25929\/revisions"}],"predecessor-version":[{"id":26112,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25929\/revisions\/26112"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/26119"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=25929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=25929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=25929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}