There is a few popular ways to run Burp Suite from PortSwigger in the pentesting environment. The simplified approach is to have a dedicated web browser to use (only) with Burp.
The downside is that the proxy setting for the browser (Chrome and Safari) needs to be set on the system level — on the Mac OS X. As a result, the whole HTTP and HTTPS traffic from the system would be routed through Burp and not only traffic from the browser but also traffic from the installed applications.
Proxy configuration in Firefox is set directly in the browser. There is no need to modify system settings.
Firefox allows creating separate profiles acting as containers storing sensitive information separated from each other. Each profile stores its own:
"Security certificate settings: The cert9.db file stores all your security certificate settings and any SSL certificates you have imported into Firefox."
Burp requires cacert.der
(CA cert) to be imported in the browser or system keychain (not recommended) to intercept HTTPS traffic. If attacker would get this certificate and MITM your connection (i.e., when using public Wi-Fi) he would get your whole traffic, unencrypted.
That is why storing this certificate in your browser, is not a good idea, because it opens up a new attack vector. If you are curious about what might happen, read about a similar case from Dell: eDellroot issue
On every new installation or when Burp’s configuration is wiped out, it would generate a new CA certificate served from “http://burp/cert" URL. It significantly makes the attack harder from the malicious actor perspective.
Thanks to Firefox and its multiple profiles, we can install cacert.der
only in a separate profile and keep the default one without Burp's CA certificate. That allows running two Firefox instances, side by side with each other. Furthermore, you can install all of the necessary plugins in Burp's Firefox profile, and it will not affect the default one.
Read more on Firefox profiles.
about:profiles
URLWhenever you want to run “Burp” profile open Firefox and go to “about:profiles” to launch it, there is an option to use CLI to run a profile as well.
/Applications/Firefox.app/Contents/MacOS/firefox-bin --profilemanager
cacert.der
in your (default) web browser, especially do not install that directly into the system keychain