Betwixt is a web Debugging Proxy based on Chrome DevTools Network panel.Betwixt will help you analyze web traffic outside the browser using familiar Chrome DevTools interface.
Installing
Download the latest release for your operating system, build your own bundle or run Betwixt from the source code.
Setting Up
In order to capture traffic, you’ll have to direct it to the proxy created by Betwixt in the background (http://localhost:8008
).
If you wish to analyze traffic system wide:
System Preferences → Network → Advanced → Proxies → Web Proxy (HTTP)
Settings → Network & Internet → Proxy
All Settings → Network → Network Proxy
If you want to capture traffic coming from a single terminal use export http_proxy=http://localhost:8008
.
Also Read – RedRabbit : Red Team PowerShell Script
Capturing encrypted traffic (HTTPS) requires additional step, follow below steps for instructions.
HTTPS
In order to capture encrypted traffic, you’ll have to install root certificate provided by Betwixt. The certificate is generated for you when you first launch Betwixt. You can quickly locate it on disk using Tools > Root Certificate
menu.
ca.pem
has to be imported and marked as trusted.
On OS X this is done via Keychain app as shown below.
After certificate is installed, expand the Trust
section and toggle the first dropdown to Always Trust
:
On Windows use certmgr.
Proxy
Direct the traffic to the proxy created by Betwixt in the background (http://localhost:8008
).
If you wish to analyze traffic system wide:
System Preferences → Network → Advanced → Proxies → Secure Web Proxy (HTTPS)
All Settings → Network → Network Proxy
Settings → Network & Internet → Proxy
If you want to capture traffic coming from a single terminal use export https_proxy=http://localhost:8008
. Note that NodeJS has a hardcoded list of CA certificates so it doesn’t care for Keychain/certmgr/etc. You may need to use export NODE_TLS_REJECT_UNAUTHORIZED=0
to overcome this issue.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…