Setup Burp Suite Pro 2.1 on MacOSX

  1. Install homebrew
    Open a terminal and run the command:
    ruby -e “$(curl -fsSL”
  2. Tap homebrew/cask-versions
    Run the command:
    brew tap homebrew/cask-versions
    “Tap” extends brew’s list of available repositories it can install, above and beyond brew’s default list of the available repositories. (For older versions try: brew tap caskroom/versions)
  3. Run the command given below to install java8:
    brew cask install adoptopenjdk8
  4. Check if java8 is successfully installed or not
    Run the command:
    /usr/libexec/java_home -verbose
Adopt Open JDK 8 is successfully installed
  • Download all the necessary burp related files from here.
  • Navigate to the downloaded folder and open 2 terminal windows.
    Run the following commands:
  • Window1:
    /Library/Java/JavaVirtualMachines/adoptopenjdk-8.jdk/Contents/Home/jre/bin/java -jar burp-loader-keygen-2_1_07.jar
Output from window1
  • Window2:
    /Library/Java/JavaVirtualMachines/adoptopenjdk-8.jdk/Contents/Home/jre/bin/java -noverify -Xbootclasspath/p:burp-loader-keygen-2_1_07.jar -jar burp2.1/burpsuite_pro_v2.1.07.jar
  • Copy the License from window1 to window2's license key section, click Next>Setup manually.
  • Paste the activation request from window2 to window1 and then copy the response from Window1 to Window2. (I had already done this step so I can’t take an SS anymore).
Burp Suite is installed successfully.
  • If you are missing a .bash_profile, just add the file in root directory via touch .bash_profile
  • Open .zshrc (if you are using ZSH) file or .bash_profile.
    nano .zshrc
  • Add the command given below: (do replace path_to_burp with the actual downloaded file path)
/Library/Java/JavaVirtualMachines/adoptopenjdk-8.jdk/Contents/Home/jre/bin/java -noverify -Xbootclasspath/p:path_to_burp/burp2.1/burp-loader-keygen-2_1_07.jar -jar path_to_burp/burp2.1/burpsuite_pro_v2.1.07.jar
  • Run source ~/.bash_profile or source ~/.zshrc
  • Now you can type burp2.1 in terminal to open Burp Suite directly.
  • Download foxy-proxy.
  • Click on edit and add as represented in the screenshot.
Setting up proxy
  • Install the burp suite certificate to intercept HTTPS traffic. Simply, follow the steps given by Portswigger




Offensive Cyber Security:)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Persistent Memory in File Systems

My smart home in 2017

Gherkin For QA— A primer to write scenarios — Part A

Spotify — Building an App with Spotipy

Spotify requests

POISON — HackTheBox WriteUp

Spare the air? Here’s a RESTful API way to tell.

CLI Gem Project

Is Microsoft managing OSS initiatives well? The case of issue #3324

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Kartik Sharma

Kartik Sharma

Offensive Cyber Security:)

More from Medium

How I was able to takeover accounts in websites deal with Github as a SSO provider

ZyXEL privilege escalation through micro_httpd web server

Detail Description about SPF Records

No Rate limit in Reset password in a shopping web application