Proxy Tooling

How to proxy CLI tools, code, and other apps

Overview

Proxying tooling like the AWS CLI, Nmap, or Python scripts is a great way to understand what's happening under the hood.


Getting a Certificate from Caido (or BurpSuite)

First, we need to download the certificate from Caido

I've placed mine in my downloads folder here /Users/tyler/Downloads/caido_ca.crt


Proxying Tooling

We need to add the following environment variables either to your current terminal session or to your shell profile e.g., ~/.zshrc

AWS CLI

We need to point the AWS CLI to our certificate otherwise we'll see SSL errors.

Alternatively, we can use this which will work with other tools like Python as well,

Now, just run any command in terminal and we should see it in Caido / BurpSuite,

And in Caido, under Proxy > HTTP History we'll see,

We can also turn on Caido > Proxy > Intercept to modify the Requests / Responses

Request

Response

curl

One way to proxy curl is by specifying the proxy in the command

nmap

We can proxy nmap by specifying the proxy as a parameter

metasploit

We can proxy metasploit exploits by setting the proxy in the exploit's configuration e.g.,


Proxychains

Proxychains enables us to easily proxy tools as well which is useful for tooling that may not have a proxy option (this can also work for tools that do).

Update your proxy config file found in:

  • Linux: /etc/proxychains.conf

  • macOS: /opt/homebrew/etc/proxychains.conf (assuming installed via Homebrew)

Optionally, uncomment quite_mode to reduce the output when running proxychains (can also use -s )

Then run your commands

And this will show up in Caido / BurpSuite.

Last updated

Was this helpful?