Skip to content

Commit

Permalink
Update MASTG-TECH-0063.md fix Tool ID
Browse files Browse the repository at this point in the history
  • Loading branch information
cpholguera authored Dec 13, 2024
1 parent 5a8797e commit 180721e
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion techniques/ios/MASTG-TECH-0063.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Setting up an Interception Proxy
platform: ios
---

@MASTG-TOOL-0007 is an integrated platform for security testing mobile and web applications. Its tools work together seamlessly to support the entire testing process, from initial mapping and analysis of attack surfaces to finding and exploiting security vulnerabilities. Burp Proxy operates as a web proxy server for Burp Suite, which is positioned as a man-in-the-middle between the browser and web server(s). Burp Suite allows you to intercept, inspect, and modify incoming and outgoing raw HTTP traffic.
@MASTG-TOOL-0077 is an integrated platform for security testing mobile and web applications. Its tools work together seamlessly to support the entire testing process, from initial mapping and analysis of attack surfaces to finding and exploiting security vulnerabilities. Burp Proxy operates as a web proxy server for Burp Suite, which is positioned as a man-in-the-middle between the browser and web server(s). Burp Suite allows you to intercept, inspect, and modify incoming and outgoing raw HTTP traffic.

Setting up Burp to proxy your traffic is pretty straightforward. We assume that both your iOS device and host computer are connected to a Wi-Fi network that permits client-to-client traffic. If client-to-client traffic is not permitted, you can use usbmuxd to connect to Burp via USB.

Expand Down

0 comments on commit 180721e

Please sign in to comment.