sleeyax / burp-awesome-tls

Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
GNU General Public License v3.0
1.27k stars 78 forks source link

Self signed certificate and not working port #60

Closed HerrLeStrate closed 9 months ago

HerrLeStrate commented 9 months ago

Hello! I configured Awesome TLS like this: image And in my browser i've set proxy settings like this: image

When i try to open google.com via firefox developer, im getting error: MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT. Then i installed ca.der from this plugin to Firefox's certificate storage, and i'm getting following error: MOZILLA_PKIX_ERROR_CA_CERT_USED_AS_END_ENTITY.

How to configure plugin to work?

Windows 11 Pro (x64) Burp Suite Professional 2023.12.1.2 JDK 18 Using 1.2.0 fat version of plugin.

sleeyax commented 9 months ago

Looks like a problem with your burp and browser configuration. Does burp's embedded browser work with the extension enabled?

HerrLeStrate commented 9 months ago

Yes, burp's embedded browser works. But afaik it uses default burp's proxy port - 8080, not 8565 (which used in awesome tls plugin)

sleeyax commented 9 months ago

You need to configure your browser to 8080 as well. The listener address is only for internal use by the TLS proxy.