# Proxychains4 + Burp
- Setup `proxychains4` to route all traffic coming from any CLI tool to any proxy we specify when appending `proxychains4` to the command
- First, edit the `/etc/proxychains4.conf` as below
- Note: comment out current line for socks5 ![[images/Pasted image 20251112153020.png]]
```bash
#socks5 127.0.01 90550
http 127.0.0.1 8080
```
- Second, enable Burp interception
- Third, now implement a command such as below
```bash
proxychains4 -q curl http://SERVER_IP:PORT
```
- Finally, we should see below as an example ![[images/Pasted image 20251112153345.png]]
# Metasplot `/auxilary/scanner/http` Module + Burp
- As an alternative, to the above sequence we can use Metasploit's `auxiliary/scanner/http/http_put` or `auxiliary/scanner/http/robots_txt` modules
- First, enable Burp interception
- Second, setup MSF `auxiliary/scanner/http/http_put` module ![[images/Pasted image 20251112153929.png]]
- Third, review intercepted request in Burp ![[images/Pasted image 20251112154005.png]]