# Proxychains4 + Burp - Setup `proxychains4` to route all traffic coming from any CLI tool to any proxy we specify when appending `proxychains4` to the command - First, edit the `/etc/proxychains4.conf` as below - Note: comment out current line for socks5 ![[images/Pasted image 20251112153020.png]] ```bash #socks5 127.0.01 90550 http 127.0.0.1 8080 ``` - Second, enable Burp interception - Third, now implement a command such as below ```bash proxychains4 -q curl http://SERVER_IP:PORT ``` - Finally, we should see below as an example ![[images/Pasted image 20251112153345.png]] # Metasplot `/auxilary/scanner/http` Module + Burp - As an alternative, to the above sequence we can use Metasploit's `auxiliary/scanner/http/http_put` or `auxiliary/scanner/http/robots_txt` modules - First, enable Burp interception - Second, setup MSF `auxiliary/scanner/http/http_put` module ![[images/Pasted image 20251112153929.png]] - Third, review intercepted request in Burp ![[images/Pasted image 20251112154005.png]]