Matias Vazquez 0 Posted August 9 Share Posted August 9 Hi guys, I can't get Burp Suite to work properly with Firefox and ESET Endpoint Security. If I uninstall the application, everything works normally, but when I install it, I get errors like 'Cross-Origin Request Blocked.' I tried disabling EVERYTHING in the antivirus manually, but it still fails. It only works if I uninstall it. Does anyone have any idea what to do? Quote Link to comment Share on other sites More sharing options...
Administrators Marcos 5,243 Posted August 9 Administrators Share Posted August 9 Could you please post a screenshot? The message sounds like coming from uBlock extension. Quote Link to comment Share on other sites More sharing options...
itman 1,743 Posted August 9 Share Posted August 9 (edited) Might be a Firefox issue; Quote Make sure media.peerconnection.enabled is default true in about:config. Does it still happen in a new profile without signing into Sync? An easy way to test a new profile is to install Developer Edition and see if it happens there or refresh your existing profile. https://support.mozilla.org/gl/questions/1432462 Edited August 9 by itman Quote Link to comment Share on other sites More sharing options...
Matias Vazquez 0 Posted August 12 Author Share Posted August 12 Quote Link to comment Share on other sites More sharing options...
Matias Vazquez 0 Posted August 12 Author Share Posted August 12 EDIT: I just confirmed, it works fine if I disable SSL/TLS in the ESET panel and then restart the machine. Is there a way to avoid this? Thanks in advance. Quote Link to comment Share on other sites More sharing options...
itman 1,743 Posted August 12 Share Posted August 12 (edited) 23 hours ago, Matias Vazquez said: I just confirmed, it works fine if I disable SSL/TLS in the ESET panel and then restart the machine. Is there a way to avoid this? Based on this: https://portswigger.net/burp/documentation/desktop/external-browser-config/certificate , I can't say that finding a solution is promising. Burp appears to be performing the exact same processing as Eset SSL/TLS scanning is doing. What you can try is to exclude the .exe's doing SSL/TLS scanning associated with Burp from Eset SSL/TLS scanning as shown below; The point to note here is that BURP is a penetration test tool: https://portswigger.net/burp/documentation/desktop/testing-workflow . As such, it should not be running on a constant basis. If the above exclusion doesn't work, your only alternative is to disable Eset SSL/TLS scanning when you are doing your testing. Edited August 13 by itman Matias Vazquez 1 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.