Intercept HTTP traffic - Hetty
Last updated
Last updated
is a valuable HTTP toolkit designed for security research. Its purpose is to serve as an open-source alternative to commercial software like Burp Suite Pro, catering to the specific requirements of the InfoSec and bug bounty communities. Hetty empowers users to perform Man-in-the-Middle (MITM) attacks, manually create and edit HTTP requests, replay proxied requests for various HTTP clients, and intercept requests and responses for in-depth manual examination.
In this guide, we'll explore how to use Hetty to intercept HTTP traffic on a target system:
When you run Hetty, an "Open File - Security Warning" window will appear. Click "Run" to proceed.
After clicking "Run," a Command Prompt window will appear as Hetty initializes.
Minimize all open windows and open a web browser (for example, Mozilla Firefox).
In the browser's address bar, type "" and press Enter. This will open the Hetty dashboard.
Within the Hetty dashboard, click the "MANAGE PROJECTS" button.
The Projects page will appear. Under the "New Project" section, provide a project name and click the "+ CREATE & OPEN PROJECT" button.
Select the "Proxy logs" icon from the left-hand navigation pane.
Now, the target system needs to be configured to use Hetty (running on the attacking machine) as a proxy.
For Chrome:
Click the "Customize and control Google Chrome" icon and select "Settings."
In the "Settings" page, expand "Advanced settings" and click on "System" in the left-hand menu.
Click "Open your computer’s proxy settings" to configure a proxy.
In the "Manual proxy setup" section, make the following adjustments:
Turn on the "Use a proxy server" option.
In the "Address" field, enter the IP address of the attacking machine.
In the "Port" field, specify the port as 8080.
Click "Save" to save the settings.
After saving, close both the "Settings" and browser windows. The proxy settings on the victim's machine are now configured.
You can now observe that the logs are being captured on the "Proxy logs" page.