Intercept HTTP traffic with Burp Proxy
Last updated: May 17, 2022
Read time: 2 Minutes
In this tutorial, you'll use a live, deliberately vulnerable website to learn how to intercept requests with Burp Proxy.
Intercepting a request
Burp Proxy lets you intercept HTTP requests and responses sent between Burp's browser and the target server. This enables you to study how the website behaves when you perform different actions.
Step 1: Launch Burp's browser
Go to the Proxy > Intercept tab.
Click the Intercept is off button, so it toggles to Intercept is on.
Click Open Browser. This launches Burp's browser, which is preconfigured to work with Burp right out of the box.
Position the windows so that you can see both Burp and Burp's browser.
Step 2: Intercept a request
Using Burp's browser, try to visit
https://portswigger.net and observe that the site doesn't load. Burp Proxy has intercepted the HTTP request that was issued by the browser before
it could reach the server. You can see this intercepted request on the Proxy > Intercept tab.
The request is held here so that you can study it, and even modify it, before forwarding it to the target server.
Step 3: Forward the request
Click the Forward button several times to send the intercepted request, and any subsequent ones, until the page loads in Burp's browser.
Step 4: Switch off interception
Due to the number of requests browsers typically send, you often won't want to intercept every single one of them. Click the Intercept is on button so that it now says Intercept is off.
Go back to the browser and confirm that you can now interact with the site as normal.
Step 5: View the HTTP history
In Burp, go to the Proxy > HTTP history tab. Here, you can see the history of all HTTP traffic that has passed through Burp Proxy, even while interception was switched off.
Click on any entry in the history to view the raw HTTP request, along with the corresponding response from the server.
This lets you explore the website as normal and study the interactions between Burp's browser and the server afterward, which is more convenient in many cases.
Next step - Modifying HTTP requests with Burp ProxyCONTINUE