hacktricks/mobile-pentesting/ios-pentesting/burp-configuration-for-ios.md

131 lines
7.9 KiB
Markdown
Raw Normal View History

# iOS Burp Suite Configuration
2022-04-28 16:01:33 +00:00
{% hint style="success" %}
Learn & practice AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Learn & practice GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
2022-04-28 16:01:33 +00:00
<summary>Support HackTricks</summary>
2024-01-03 11:43:38 +01:00
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}
{% endhint %}
2022-04-28 16:01:33 +00:00
<figure><img src="../../.gitbook/assets/image (48).png" alt=""><figcaption></figcaption></figure>
2022-06-06 22:28:05 +00:00
2023-01-01 17:19:07 +01:00
\
Use [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_term=trickest&utm_content=burp-configuration-for-ios) to easily build and **automate workflows** powered by the world's **most advanced** community tools.\
Get Access Today:
2022-04-28 16:01:33 +00:00
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=burp-configuration-for-ios" %}
2022-06-06 22:28:05 +00:00
## Installing the Burp Certificate on iOS Devices
2021-05-13 17:53:07 +00:00
Kwa uchambuzi wa trafiki salama wa wavuti na SSL pinning kwenye vifaa vya iOS, Burp Suite inaweza kutumika kupitia **Burp Mobile Assistant** au kupitia usanidi wa mikono. Hapa kuna mwongozo wa muhtasari juu ya mbinu zote mbili:
2021-05-13 18:33:03 +00:00
### Automated Installation with Burp Mobile Assistant
**Burp Mobile Assistant** inarahisisha mchakato wa usakinishaji wa Cheti cha Burp, usanidi wa proxy, na SSL Pinning. Mwongozo wa kina unaweza kupatikana kwenye [PortSwigger's official documentation](https://portswigger.net/burp/documentation/desktop/tools/mobile-assistant/installing).
2021-05-13 17:53:07 +00:00
### Manual Installation Steps
1. **Proxy Configuration:** Anza kwa kuweka Burp kama proxy chini ya mipangilio ya Wi-Fi ya iPhone.
2. **Certificate Download:** Tembelea `http://burp` kwenye kivinjari cha kifaa chako ili kupakua cheti.
3. **Certificate Installation:** Sakinisha profaili iliyopakuliwa kupitia **Settings** > **General** > **VPN & Device Management**, kisha wezesha kuamini kwa CA ya PortSwigger chini ya **Certificate Trust Settings**.
### Configuring an Interception Proxy
Usanidi huu unaruhusu uchambuzi wa trafiki kati ya kifaa cha iOS na mtandao kupitia Burp, ukihitaji mtandao wa Wi-Fi unaounga mkono trafiki ya mteja-kwa-mteja. Ikiwa haipatikani, muunganisho wa USB kupitia usbmuxd unaweza kutumika kama mbadala. Miongozo ya PortSwigger inatoa maelekezo ya kina juu ya [device configuration](https://support.portswigger.net/customer/portal/articles/1841108-configuring-an-ios-device-to-work-with-burp) na [certificate installation](https://support.portswigger.net/customer/portal/articles/1841109-installing-burp-s-ca-certificate-in-an-ios-device).
### Advanced Configuration for Jailbroken Devices
Kwa watumiaji wenye vifaa vilivyovunjwa, SSH kupitia USB (kupitia **iproxy**) inatoa njia ya kuelekeza trafiki moja kwa moja kupitia Burp:
1. **Establish SSH Connection:** Tumia iproxy kupeleka SSH kwa localhost, kuruhusu muunganisho kutoka kifaa cha iOS hadi kompyuta inayotumia Burp.
2024-02-11 02:13:58 +00:00
```bash
iproxy 2222 22
```
2. **Remote Port Forwarding:** Peleka bandari ya kifaa cha iOS 8080 kwa localhost ya kompyuta ili kuwezesha ufikiaji wa moja kwa moja wa kiolesura cha Burp.
2024-02-11 02:13:58 +00:00
```bash
ssh -R 8080:localhost:8080 root@localhost -p 2222
```
3. **Global Proxy Setting:** Mwishowe, sanidi mipangilio ya Wi-Fi ya kifaa cha iOS kutumia proxy ya mikono, ikielekeza trafiki yote ya wavuti kupitia Burp.
### Full Network Monitoring/Sniffing
Ufuatiliaji wa trafiki ya vifaa isiyo ya HTTP unaweza kufanywa kwa ufanisi kwa kutumia **Wireshark**, chombo kinachoweza kukamata aina zote za trafiki ya data. Kwa vifaa vya iOS, ufuatiliaji wa trafiki wa wakati halisi unarahisishwa kupitia uundaji wa Remote Virtual Interface, mchakato ulioelezewa katika [hii Stack Overflow post](https://stackoverflow.com/questions/9555403/capturing-mobile-phone-traffic-on-wireshark/33175819#33175819). Kabla ya kuanza, usakinishaji wa **Wireshark** kwenye mfumo wa macOS ni sharti.
2024-02-05 21:00:40 +01:00
Mchakato huu unajumuisha hatua kadhaa muhimu:
1. Anzisha muunganisho kati ya kifaa cha iOS na mwenyeji wa macOS kupitia USB.
2. Thibitisha **UDID** ya kifaa cha iOS, hatua muhimu kwa ajili ya ufuatiliaji wa trafiki. Hii inaweza kufanywa kwa kutekeleza amri kwenye Terminal ya macOS:
```bash
$ rvictl -s <UDID>
Starting device <UDID> [SUCCEEDED] with interface rvi0
```
3. Baada ya kubaini UDID, **Wireshark** inafunguliwa, na kiunganishi "rvi0" kinachaguliwa kwa ajili ya kukamata data.
4. Kwa ufuatiliaji wa lengo, kama vile kukamata trafiki ya HTTP inayohusiana na anwani maalum ya IP, Filters za Kukamata za Wireshark zinaweza kutumika:
## Usanidi wa Cheti cha Burp katika Simulator
* **Export Burp Certificate**
Katika _Proxy_ --> _Options_ --> _Export CA certificate_ --> _Certificate in DER format_
![](<../../.gitbook/assets/image (534).png>)
* **Drag and Drop** cheti ndani ya Emulator
* **Ndani ya emulator** nenda kwenye _Settings_ --> _General_ --> _Profile_ --> _PortSwigger CA_, na **thibitisha cheti**
* **Ndani ya emulator** nenda kwenye _Settings_ --> _General_ --> _About_ --> _Certificate Trust Settings_, na **wezesha PortSwigger CA**
![](<../../.gitbook/assets/image (1048).png>)
**Hongera, umefaulu kusanidi Cheti cha Burp CA katika simulator ya iOS**
{% hint style="info" %}
**Simulator ya iOS itatumia usanidi wa proxy wa MacOS.**
{% endhint %}
### Usanidi wa Proxy wa MacOS
Hatua za kusanidi Burp kama proxy:
* Nenda kwenye _System Preferences_ --> _Network_ --> _Advanced_
* Katika tab ya _Proxies_ weka alama kwenye _Web Proxy (HTTP)_ na _Secure Web Proxy (HTTPS)_
* Katika chaguo zote mbili sanidi _127.0.0.1:8080_
![](<../../.gitbook/assets/image (431).png>)
* Bonyeza _**Ok**_ na kisha _**Apply**_
2022-04-28 16:01:33 +00:00
<figure><img src="../../.gitbook/assets/image (48).png" alt=""><figcaption></figcaption></figure>
2022-06-06 22:28:05 +00:00
2023-01-01 17:19:07 +01:00
\
Tumia [**Trickest**](https://trickest.com/?utm_source=hacktricks&utm_medium=text&utm_campaign=ppc&utm_term=trickest&utm_content=burp-configuration-for-ios) kujenga na **kujiendesha kiotomatiki** kwa urahisi kwa kutumia zana za jamii **zilizoendelea zaidi** duniani.\
2024-02-11 02:13:58 +00:00
Pata Ufikiaji Leo:
2022-06-06 22:28:05 +00:00
{% embed url="https://trickest.com/?utm_source=hacktricks&utm_medium=banner&utm_campaign=ppc&utm_content=burp-configuration-for-ios" %}
{% hint style="success" %}
Jifunze na fanya mazoezi ya AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Jifunze na fanya mazoezi ya GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
<summary>Support HackTricks</summary>
2022-04-28 16:01:33 +00:00
* Angalia [**mpango wa usajili**](https://github.com/sponsors/carlospolop)!
* **Jiunge na** 💬 [**kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **fuata** sisi kwenye **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Shiriki mbinu za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}
</details>
{% endhint %}