I. BACKGROUND notes
This is often the case when configuring Burpsuite agent truncation:
Browsers often send some of their own packages (collect user information), dry-penetration test personnel to the target site detection;
If it is a proxy phone, it is a lot of apps from time to time to send some packages, dry the penetration tester to detect the target app.
Browser and app bundle We are not a good limit, but Burpsuite has a configuration that only intercepts packets for the specified website, and the packets for other websites are released by default.
Second, operating instructions
Start burpsuite--switch to "Proxy" tab--Select "Options" menu--see "Intercept Client Requests" section below
In this section we can see that this location can be configured to intercept conditions, we only intercept "www.baidu.com" as an example
Click "Add"--Boolean operation Select "and"--match type Select "Domain name"--Match relation Select "Matches"--Match condition input "www.baidu.com"--click "OK"
Switch back to "Intercept", at this time "Intercept is on" but will only intercept Baidu's packet, the other website's data packets are directly released
In fact, in the "Intercept Client Requests" section can also configure a variety of filtering conditions to play their own free.
Also note that only the request is configured on the top, and if you want to configure Respone filtering, configure it to the "Intercept Server respones" section of the bottom.
Burpsuite only block specific website packet Tutorials