This article will shortly describe the mechanisms and tools that allow the interception of any UDP or TCP traffic via Burp proxy. The main driver behind this endeavour was the ability to inject and modify the packets for various protocols via intuitive Burp interface. Burp is a powerful proxy for web application pentests, but only speaks http and https. So , in order to redirect traffic which is not http/https via Burp we need to configure another intermediate component that will listen for a desired traffic , direct this traffic to Burp so we can tamper with it, and Burp will forward it further to the destination server. This intermediate component is mitm_relay.py, a python script available at Github. https://github.com/jrmdev/mitm_relay Implementation The first step is to run mitm_relay.py. -l =IP address on which the local server will listen. I set it to listen on all available interfaces (0.0.0.0) -p=where is Burp proxy running (127.0.0.1, port 8080) -...