1️⃣ Intercept Proxies
- Purpose: Capture and inspect network traffic in real-time.
- How they work:
- Intercept requests from connected clients.
- Optionally modify request or response data.
- Forward traffic to its intended destination.
- Common use cases:
- Injecting payloads.
- Modifying HTTP responses.
- Collecting credentials.
2️⃣ Captive Portal Proxies
- Purpose: Redirect all client requests to a specific web page before granting internet access.
- How they work:
- Force all HTTP requests to a local login or information page.
- Can simulate public Wi-Fi login portals.
- Often used for phishing scenarios or credential harvesting.
- Common use cases:
- Fake login pages.
- Terms-of-service acceptance pages.
- Social engineering experiments.
Only one proxy can be run at a time, as each proxy is designed to manipulate and redirect data packets through a specific port.
- phishportal - Allow block Internet access for users until they open the page login page.
- flowtamper - Allow block Internet access for users until they open the page login page.
- noproxy - Runnning without proxy redirect traffic