<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									What is an intercepting proxy? - Cyber Security				            </title>
            <link>https://www.hacktheforum.com/cyber-security/what-is-an-intercepting-proxy/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Tue, 07 Apr 2026 04:20:42 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>What is an intercepting proxy?</title>
                        <link>https://www.hacktheforum.com/cyber-security/what-is-an-intercepting-proxy/#post-20060</link>
                        <pubDate>Mon, 06 Apr 2026 21:47:32 +0000</pubDate>
                        <description><![CDATA[An intercepting proxy is a tool that sits between your browser (client) and a web server, allowing you to capture, inspect, and modify the traffic going back and forth.
A well-known example...]]></description>
                        <content:encoded><![CDATA[<p data-start="0" data-end="184">An <strong data-start="3" data-end="25">intercepting proxy</strong> is a tool that sits <strong data-start="46" data-end="79">between your browser (client)</strong> and a <strong data-start="86" data-end="100">web server</strong>, allowing you to <strong data-start="118" data-end="150">capture, inspect, and modify</strong> the traffic going back and forth.</p>
<p data-start="186" data-end="273">A well-known example is the proxy feature in <strong data-start="231" data-end="272"><span class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"><span class="whitespace-normal">Burp Suite</span></span></strong>.</p>
<p data-start="186" data-end="273"> </p>
<h2 data-section-id="ic8ktf" data-start="280" data-end="298">How It Works</h2>
<p data-start="299" data-end="308">Normally:</p>
<div class="relative w-full mt-4 mb-1">
<div class="">
<div class="relative">
<div class="h-full min-h-0 min-w-0">
<div class="h-full min-h-0 min-w-0">
<div class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl">
<div class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback">
<div class="w-full overflow-x-hidden overflow-y-auto pe-11 pt-3">
<div class="relative z-0 flex max-w-full">
<div id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr">
<div class="cm-scroller">
<div class="cm-content q9tKkq_readonly">
<pre contenteditable="false">Browser → Server → Browser</pre>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="">
<div class=""> </div>
</div>
</div>
</div>
</div>
<p data-start="345" data-end="372">With an intercepting proxy:</p>
<div class="relative w-full mt-4 mb-1">
<div class="">
<div class="relative">
<div class="h-full min-h-0 min-w-0">
<div class="h-full min-h-0 min-w-0">
<div class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl">
<div class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback">
<div class="pointer-events-none absolute end-1.5 top-1 z-2 md:end-2 md:top-1"> </div>
<div class="w-full overflow-x-hidden overflow-y-auto pe-11 pt-3">
<div class="relative z-0 flex max-w-full">
<div id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr">
<div class="cm-scroller">
<div class="cm-content q9tKkq_readonly">
<pre contenteditable="false">Browser → Intercepting Proxy → Server → Intercepting Proxy → Browser</pre>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="">
<div class=""> </div>
</div>
</div>
</div>
</div>
<p data-start="451" data-end="530">The proxy acts like a <strong data-start="473" data-end="486">middleman</strong>, giving you control over the communication.</p>
<p data-start="451" data-end="530"> </p>
<h2 data-section-id="20xrdm" data-start="537" data-end="566">What You Can Do With It</h2>
<ul data-start="567" data-end="821">
<li data-section-id="18icp13" data-start="567" data-end="623"><strong data-start="569" data-end="586">View requests</strong> (headers, cookies, parameters, etc.)</li>
<li data-section-id="1gigw4d" data-start="624" data-end="721"><strong data-start="626" data-end="645">Modify requests</strong> before they reach the server<br data-start="674" data-end="677" />(e.g., change a username, price, or token)</li>
<li data-section-id="1uj5oqs" data-start="722" data-end="763"><strong data-start="724" data-end="745">Inspect responses</strong> from the server</li>
<li data-section-id="1lrccdg" data-start="764" data-end="821"><strong data-start="766" data-end="799">Test security vulnerabilities</strong> in web applications</li>
</ul>
<p data-start="451" data-end="530"> </p>
<p data-start="451" data-end="530"> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/cyber-security/">Cyber Security</category>                        <dc:creator>Gauz Khas</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/cyber-security/what-is-an-intercepting-proxy/#post-20060</guid>
                    </item>
							        </channel>
        </rss>
		