Traffic from WSL to Burp Suite

How to Route Traffic from WSL to Burp Suite on Windows: A Step-by-Step Guide

Easily Capture and Analyze WSL Network Traffic Through Burp Suite

coffinxparrow-up-rightcoffinxparrow-up-rightFollowarrow-up-rightInfoSec Write-upsInfoSec Write-upsarrow-up-rightandroidstudio~4 min read·March 21, 2025 (Updated: March 21, 2025)·Free: No

Introduction

If you're using Kali Linux on WSL (Windows Subsystem for Linux) and want to capture or analyze its traffic in Burp Suite, you may run into challenges. Routing traffic from WSL to Burp Suite on a Windows host can be tricky due to firewall restrictions. In this guide, we'll walk you through the complete process of proxying Kali WSL traffic through Burp Suite installed on your Windows machine.

Understanding WSL and Its Network Structure

WSL allows you to run Linux distributions directly on Windows without needing a virtual machine or dual boot. While WSL shares networking resources with the Windows host, configuring its traffic to pass through external applications like BurpSuite requires some tweaks.

Prerequisites for Proxying WSL Traffic

  • A Windows machine with WSL installed.

  • Kali Linux set up in WSL.

  • BurpSuite installed on Windows.

Step 1: Install and Set Up Kali Linux on WSL

  1. Open PowerShell as Administrator.

  2. Install Kali-linux using:

Copywsl --install -d kali-linux

3. Update and upgrade packages:

Step 2: Install BurpSuite on Windows

  • Download BurpSuite from the official website.

  • Follow the installation instructions.

  • Launch BurpSuite and ensure it's ready for proxying

Step 3: Identifying system IP Addresses

On the Windows host open PowerShell or Command Prompt and run:

Locate the IPv4 Address under Ethernet adapter vEthernet (WSL (Hyper-V firewall)) on your Windows machine. Copy this IP address and run a ping test from Kali WSL to check if the host is reachable.

The first time you try to ping this IP to test connectivity it won't work because the Windows firewall blocks all incoming requests by default.

Step 4: Configure Windows Network for WSL

  1. Open Windows Defender Firewall.

  2. Go to Advanced Settings.

  3. Disable firewall protection for both Domain, Private and Public networks under the WSL interface by uncheck the vEthernet (WSL (Hyper-V firewall)) box and click apply and Ok.

None

Now from Kali WSL try pinging the host's IP address to verify network connectivity. You should see a response indicating that the host is reachable.

Step 5: Testing Traffic with wget

Now test the proxy by running the following wget command in Kali WSL

If you see a response like this, it means your proxy is successfully configured with the WSL IP

Step 6: Configure BurpSuite as a Proxy listener

  1. Open BurpSuite and go to Proxy → Options.

  2. add a new listener on [host_ip]:8080.

  3. Click on specific address and select WSL host IP address.

None

To further confirm that Burp Suite is capturing the requests try using a tool like ffuf or sqlmap with the proxy configured For example:

None

Now you'll see all the WSL traffic routed through Burp Suite, allowing you to inspect, intercept and analyze the requests.

Why Use BurpSuite for Proxying WSL Traffic?

  • Analyze HTTP/HTTPS requests in real-time.

  • Useful for penetration testing.

  • Debug and monitor web applications.

  • Inspect API requests and responses

Conclusion

By following these steps you can successfully route traffic from WSL through Burp Suite, allowing for effective interception and analysis. Whether for penetration testing, debugging or learning, this setup is invaluable for security professionals

Last updated