Name is required.
Email address is required.
Invalid email address
Answer is required.
Exceeding max length of 5KB

Can we Test ThickClient build using C++ running on TCP Protocol

Arun Pillai Mar 09, 2015 04:56AM UTC

Hi,

We are pen-testing Thick-client application developed in C++ running on TCP protocol using Winsock controls. I have tried changing the following

>> Under proxy tab modified Options as
------------------------------------------------------------------------------------------------------------------------
Running | Interfaces | Invisibles | Redirect | Certificate
------------------------------------------------------------------------------------------------------------------------
Checked |127.0.0.1:50025| Checked | http://171.1.1.104:22| Per host

>> enabled to support invisible proxy

Was unable to capture any traffic, can you suggest what I am doing wrong.


Dafydd Stuttard Mar 09, 2015 11:59AM UTC Support Center agent

Does this client application use HTTP/S for its communications with the server? If so, and it doesn’t honor the configured proxy settings, then you might be able to capture the traffic using invisible proxying and using the steps described in detail here:

http://portswigger.net/burp/help/proxy_options_invisible.html

If the client application is using something other than HTTP/S, then Burp can’t intercept its traffic.


Arun Pillai Mar 12, 2015 04:30AM UTC
The AUT only communicates using TCP/IP with the databases servers. So I guess burpsuit doesn't intercept the traffic on transport layer. Any suggestion on another tools which could be used for the same.

Post Your public answer

Your name
Your email address
Answer