<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Proxy on System Overlord</title><link>https://systemoverlord.com/tags/proxy.html</link><description>Recent content in Proxy on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sun, 13 Jul 2014 20:57:18 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/proxy/index.xml" rel="self" type="application/rss+xml"/><item><title>Passing Android Traffic through Burp</title><link>https://systemoverlord.com/2014/07/13/passing-android-traffic-through-burp/</link><pubDate>Sun, 13 Jul 2014 20:57:18 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/07/13/passing-android-traffic-through-burp/</guid><description>&lt;p&gt;I wanted to take a look at all HTTP(S) traffic coming from an Android device, even if applications made direct connections without a proxy, so I set up a transparent Burp proxy. I decided to put the Proxy on my Kali VM on my laptop, but didn&amp;rsquo;t want to run an AP on there, so I needed to get the traffic to there.&lt;/p&gt;
&lt;h3 id="network-setup"&gt;Network Setup&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://systemoverlord.com/img/blog/wifitap.png" alt="Network Topology Diagram"&gt;&lt;/p&gt;
&lt;p&gt;The diagram shows that my wireless lab is on a separate subnet from the rest of my network, including my laptop. The lab network is a NAT run by IPTables on the Virtual Router. While I certainly could&amp;rsquo;ve ARP poisoned the connection between the Internet Router and the Virtual Router, or even added a static route, I wanted a cleaner solution that would be easier to enable/disable.&lt;/p&gt;</description></item></channel></rss>