Squid proxy server for penetration testing drop boxes

kali null
2 min readSep 29, 2018

I perform network penetration testing from headless Kali boxes. This is limiting when I want to test internally available web apps. I can get away with SSH tunneling (aka port forwarding) for basic applications or RDP interface but it quickly becomes a pain once you start interacting with dynamic content and especially with redirections. And thats where the Squid proxy comes in handy. So the goal is to run internally available web pages that were found during the assessment through the instance of Burp Pro on my local machine.

Steps:

  1. Spin up a Squid proxy server on the remote instance:

apt-get install squid3

Modify the config file:

Find and uncomment this line in your /etc/squid/squid.conf: #http_access allow localnet

Add your gateway to the acl: acl localnet scr 192.168.0.1/255.255.255.0

Restart the server: service squid restart

Always good idea to double check yourself. Your nmap output for localhost should look like this:

2. On your local machine’s browser send all the traffic through the remote box on port 3128.

3. In Burp set upstream proxy server in the ‘User options’ tab to your remote IP and port 3128 and leave listener proxy as the default.

You can now browse webpages in Firefox using internal IPs from your remote network and scan them with Burp.

W00t!!

Bitcoin tip jar: bc1qgpl6lhf09j6kcdvkh8cz90p4cfxuyfec3ecjrd

Ethereum tip jar: 0x7e0Bf6D50b5F5fcbf76A16Bd5285CE0c74C063a9

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

kali null
kali null

Written by kali null

security researcher and penetration tester. twitter: @kali_null

No responses yet

Write a response