# Tools

## **Burp Suite Community Edition**

Burp Suite should come stock with the latest version of Kali, but if it does not then use the following command:

```bash
sudo apt-get install burpsuite -y
```

Download Jython (<https://www.jython.org/download.html>) and add the .jar file to the Extender Options:

<figure><img src="https://825333096-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrbHTUw6JmYWHWgF1IhRj%2Fuploads%2FdeIVguMbwZQhUrHj41Fr%2FuShnJZrYSwObdQdeTKgn_Setup1.png?alt=media&#x26;token=11316291-a90f-4b8a-acdc-0e22baa75b32" alt=""><figcaption><p>Under the Extender BApp Store search for Autorize and install the extension.</p></figcaption></figure>

## **Foxy Proxy Standard**

While Firefox is open use the shortcut **CTRL+Shift+A** or navigate to <https://addons.mozilla.org/en-US/firefox/addon>.

1. Search for FoxyProxy Standard.
2. Add FoxyProxy to Firefox.
3. Install FoxyProxy Standard and add it to your browser.
4. Click the fox icon at the top-right corner of your browser (next to the URL) and select Options.
5. Select Proxies >Add New Proxy >Manual Proxy Configuration.
6. Add 127.0.0.1 as the host IP address.
7. Update the port to 8080 (Burp Suite’s default proxy settings).
8. Under the General tab, rename the proxy to **BurpSuite**.
9. Add a second new proxy:
   1. Add 127.0.0.1 as the host IP address.
   2. Update the port to 5555.
   3. Under the General tab, rename the proxy to **Postman**.

## **Burp Suite Certificate**

1. Start Burp Suite.
2. Open your browser of choice.
3. Using FoxyProxy, select the BurpSuite proxy. Navigate to <http://burpsuite> and click the CA Certificate. This should initiate the download of the Burp Suite CA certificate.
4. Save the certificate somewhere you can find it.
5. Open your browser and import the certificate. In Firefox, open Preferences and use the search bar to look up certificates. Import the certificate.

<figure><img src="https://825333096-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrbHTUw6JmYWHWgF1IhRj%2Fuploads%2FtHSz5XSmAx0Cb0TKj308%2FpNXd3clsQOySA6FP6NLQ_Capturecert.png?alt=media&#x26;token=77886f5b-892b-4a06-bdf6-3b119cfe9400" alt=""><figcaption></figcaption></figure>

Now that you have the PortSwigger CA certificate added to your browser, you should be able to intercept traffic without experiencing issues.

## MITMweb Certificate Setup

Now we will also import the cert for MITMweb through a very similar process.

1. Stop burpsuite (it's listening on 8080 and mitmweb needs that to work)
2. Start mitmweb from the terminal:

```bash
mitmweb
```

3. Use FoxyProxy in Firefox to send traffic to the BurpSuite proxy (8080).
4. Using Firefox Visit mitm.it.

<figure><img src="https://825333096-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrbHTUw6JmYWHWgF1IhRj%2Fuploads%2FWXjGjYiMWhJ08k0n85JU%2F2tR5PEZbQLU0Oh8rNK7E_cert101.png?alt=media&#x26;token=ded53220-983a-46fa-bd4f-7f760ed6c35c" alt=""><figcaption></figcaption></figure>

5. Download the mitmproxy-ca-cert.pem for Firefox.
6. Return to the Firefox certificates (see Burp Suite Certificate instructions).

<figure><img src="https://825333096-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrbHTUw6JmYWHWgF1IhRj%2Fuploads%2FIlRJ78ta8Iv23qgflPBA%2F94VQmADbSqCAZbaz2zKT_Capturecert2.png?alt=media&#x26;token=17ac1afc-9ea4-41a3-b08a-a0b0f7f50908" alt=""><figcaption></figcaption></figure>

7. Import the MITMweb (mitmproxy-ca-cert.pem) certificate.

<figure><img src="https://825333096-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FrbHTUw6JmYWHWgF1IhRj%2Fuploads%2FHff81DJYmIBtAsiyY3o6%2FmEXrG0xJSQeDsjpAWqR5_Capturecert4.png?alt=media&#x26;token=a9cab848-74d1-4885-a045-f033dc9f18f1" alt=""><figcaption></figcaption></figure>

## Install Postman

```bash
sudo wget https://dl.pstmn.io/download/latest/linux64 -O postman-linux-x64.tar.gz && sudo tar -xvzf postman-linux-x64.tar.gz -C /opt && sudo ln -s /opt/Postman/Postman /usr/bin/postman
```

## Install mitmproxy2swagger

```bash
sudo pip3 install mitmproxy2swagger
```

## Install Git

```bash
sudo apt-get install git
```

## Install Docker

```bash
sudo apt-get install docker.io docker-compose
```

## Install Go

```bash
sudo apt install golang-go
```

## The JSON Web Token Toolkit v2

<pre class="language-bash"><code class="lang-bash">cd /opt
sudo git clone https://github.com/ticarpi/jwt_tool
cd jwt_tool
python3 -m pip install termcolor cprint pycryptodomex requests
sudo chmod +x jwt_tool.py
<strong>sudo ln -s /opt/jwt_tool/jwt_tool.py /usr/bin/jwt_tool
</strong></code></pre>

## Install Kiterunner

<pre class="language-bash"><code class="lang-bash">sudo git clone  https://github.com/assetnote/kiterunner.git
<strong>cd kiterunner
</strong>sudo make build
sudo ln -s /opt/kiterunner/dist/kr /usr/bin/kr
</code></pre>

## Install Arjun

```bash
sudo git clone https://github.com/s0md3v/Arjun.git
```

## Install OWASP ZAP

```bash
sudo apt install zaproxy
```

Once ZAP is installed, make sure to navigate to the Manage Add-Ons (CTRL+U). Make sure to apply updates for the Fuzzer and OpenAPI Support.

## Useful Wordlists

### **SecLists**

{% embed url="<https://github.com/danielmiessler/SecLists>" %}

```bash
sudo wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip
sudo unzip SecList.zip
sudo rm -f SecList.zip
```

### Hacking-APIs

{% embed url="<https://github.com/hAPI-hacker/Hacking-APIs>" %}

```bash
sudo wget -c https://github.com/hAPI-hacker/Hacking-APIs/archive/refs/heads/main.zip -O HackingAPIs.zip
sudo unzip HackingAPIs.zip
sudo rm -f HackingAPIs.zip
```
