Intercepting traffic from thick client applications

Sandeep Wawdane
3 min readAug 14, 2021

--

Hi everyone, In this tutorial, we will learn how to intercept traffic from the thick client applications.

Fiddler is a free web debugging proxy for any browser and platform. You can download it from below official link:

1. Install and open fiddler.

Fiddler interface

2. Fiddler allows you to decrypt HTTPS traffic by installing its root certificate and enabling HTTPS decryption. Navigate to Tools Options HTTPS, and check the checkbox that says “Capture HTTPS CONNECTs” , “Decrypt HTTPS Traffic” and “Ignore server certificate errors”.

HTTPS tab

3. Click on “Actions”, then “Trust Root Certificate”. Follow the popup’s instructions to add Fiddler’s certificate to the list of trusted certificates.

4. We can configure “Manual Proxy Configuration” in which fiddler will redirect the traffic to our burpsuite proxy. Navigate to Tools Options Gateway. Select “Manual Proxy Configuration” and set burpsuite listener proxy.

Gateway tab

5. Open burp and navigate to the proxyoptions tab. Verify that the proxy listener is active and set to 127.0.0.1:8080.

6. Click on the “WinConfig button and select “exempt none” to avoid system applications traffic being intercepted.

7. Launch thick client application.

Thick client application

8. You can see request captured in burpproxy.

To intercept Non-Https traffic checkout following referenced writeup

That’s all for today folks, Thanks…

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Sandeep Wawdane
Sandeep Wawdane

Written by Sandeep Wawdane

I enjoy sharing ideas, researching, and exploring new opportunities in cybersecurity.

Responses (1)

Write a response