Skip to content
LogoTechnipages
LogoTechnipages
  • Topics
        • Android
        • Browsers
        • Gaming
        • Hardware
        • Internet
        • iPhone
        • Linux
        • macOS
        • Office
        • Reviews
        • Software
        • Windows
        • Definitions
        • All Recent Posts
  • Product Reviews
  • About

How to Set up a Proxy Listener in Burp Suite

Mel HawthorneNovember 10, 2020 Comments (0)

The primary purpose of Burp Suite is to intercept and modify web traffic as part of a penetration test. To be able to do intercept web traffic you need to configure your browser or operating system to redirect traffic through the Burp proxy. By default, the proxy starts with Burp and binds to the loopback address on port 8080 “127.0.0.1:8080” but there are plenty of options for you to configure.

How to configure a proxy listener in Burp

To configure the proxy settings, you want to go to the “Options” sub-tab in the “Proxy” tab. In the “Proxy Listeners” section you can edit the current proxy listener, by selecting a listener and clicking “Edit”, or set up a second one by clicking “Add”.

Tip: To be operational the proxy listener must have the “running” checkbox on the left ticked.

Select a listener then click edit or add a new one.

When editing the proxy listener, the “Binding” tab allows you to configure which port number and which interface it binds to in the binding tab. You should use a port number should be between 1001 and 65535 as port numbers below 1000 can require extra permissions.

Binding to the loopback address means that the proxy is only available to the local computer. Alternatively, you can bind it to another IP address your computer has via the drop-down box, although it won’t explain what physical interface this relates to and whether other devices will be able to access it. Selecting “All interfaces” will make the proxy visible on all of the IP addresses your computer has.

Tip: Using IP addresses other than the loopback can allow you to configure other devices to proxy their traffic through your Burp instance. Remember that you’ll have to install the Burp certificate on those devices to monitor their HTTPS traffic. Please note that you need permission from the owner of the device to legally be able to do this and any users should be aware that you’re monitoring their network usage and will be able to see their passwords etc.

The “Binding” tab allows you to set the IP address and port number used by the proxy.

Other proxies, custom certificates, and TLS protocols

The “Request handling” tab allows you to configure a host and port number to where all requests will be redirected to the specified location regardless of what resource they requested. This option is used to forward traffic through another proxy.

“Force TLS” automatically upgrades all web requests to use HTTPS. This option can break some websites if they don’t support HTTPS. “Invisible proxying” enables support for devices that don’t support traditional proxy settings.

The “Request handling” tab allows burp to work with other proxies.

The “Certificate” tab allows you to configure how the HTTPS certificate works. “Generate CA-signed per-host certificates” is the default setting and should generally be used. “Self-signed” certificates will always generate certificate error messages. Specifying a “specific hostname” is only useful when performing invisible proxying to a single domain. If a specific certificate is required, you can import it with the “custom certificate” option.

The “Certificate” tab is used to configure which certificate is presented.

The “TLS Protocols” tab allows you to specify which TLS protocols you want Burp to support. By default, TLSv1-1.3 is supported. You can choose to disable any of those options or enable SSLv2 or SSLv3 if you manually specify the protocols. This should only be used if you want to specifically test a single protocol or can’t connect to a legacy device.

The “TLS Protocols” tab is used to configure which TLS protocols Burp can use to connect.

Categories: Software

Author Mel Hawthorne

You Might Also Like

  • 7 Chrome Extensions to Make Gmail More Productive

    Judy SanhzInternet
  • Google Chrome Logo Header

    How to Add Print Button to Bookmarks Bar in Google Chrome

    Mitch BartlettSoftware
  • lastpass-invalid-response-error-fix

    How to Fix LastPass “Invalid Response” Error

    Madalina DinitaSoftware
  • powerpoint reverts to first slide fix

    How to Turn Text Upside Down in Microsoft PowerPoint

    Judy SanhzSoftware

Leave a Reply

Your email address will not be published. Required fields are marked *

  • does chromebook need an antivirus

    Does Chromebook Need an Antivirus?

  • top vpns

    Top 5 VPNs to Keep Your Information Private in 2026

  • npu power management bug

    What Is the NPU Power Management Bug and How Do You Fix It?

  • pc can't enroll for windows 10 extended security updates

    PC Can’t Enroll for Windows 10 Extended Security Updates – How to Fix

  • hdd better than an ssd

    When Is an HDD Better Than an SSD?

profile pic

The Experts Behind Technipages

My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

Learn More

technipages logo white
linkedin icon

Technipages is part of Guiding Tech Media, a leading digital media publisher focused on helping people figure out technology. Learn more about our mission and team here.

© 2026 Guiding Tech Media All Rights Reserved

  • About Us
  • Contact
  • Terms of Use
  • Privacy Policy

© 2026 Guiding Tech Media All Rights Reserved

Information from your device can be used to personalize your ad experience.
Do not sell my personal information.