Traffic Interception
Real-time traffic interception and modification capabilities in InterceptSuite.
Overview
In the Proxy tab, InterceptSuite provides powerful interception features that allow you to intercept and modify network traffic in real-time. You can intercept and edit traffic for both directions:
- Client to Server - Intercept outgoing requests
- Server to Client - Intercept incoming responses
Interception Controls
Forward and Drop Actions
When a packet is intercepted, you have two primary actions:
- Forward Button - Allows you to forward the intercepted packet to its destination
- Drop Button - Drops the packet so it will not be sent to the server or client
Enabling Interception
By default, interception is disabled. To start intercepting traffic:
- Enable Interception - Use the "Intercept ON/OFF" button to activate interception
- Select Direction - Simply enabling intercept won't capture packets; you must also select the direction
Direction Options
In the direction dropdown, you can select from 3 options:
- Client to Server - Intercept only client-to-server packets (outgoing requests)
- Server to Client - Intercept only server-to-client packets (incoming responses)
- Both - Intercept traffic in both directions (requests and responses)
Packet Data Viewer
The packet data viewer allows you to examine and modify intercepted packets.
Default State
By default, the packet data viewer is a normal text box that remains inactive until a packet is intercepted.
Viewing and Editing Options
When a packet is intercepted, you can use the packet viewer to edit packet data content:
Raw Tab
- Purpose: Edit raw packet data
- Format: Plain text representation of the packet
- Editable: ✅ Yes - you can modify the packet content
Hex Tab
- Purpose: View packet data in hexadecimal format
- Format: Hexadecimal representation of the packet bytes
- Editable: ❌ No - hex data is read-only for viewing purposes
Multiple Packet Handling
Intercept Packet Queue
When interception is enabled, InterceptSuite manages multiple packets using a queue system:
- Automatic Queuing - When intercept is ON, packets are automatically added to the intercept packet queue
- Packet Pausing - Each intercepted packet is paused and added to the queue list
- First Packet Display - On the intercept tab, you can only view the first packet that was intercepted
- Queue Counter - Check the number of packets in the queue at the top right side of the interface
FIFO Processing
InterceptSuite uses a FIFO (First In, First Out) queue system:
- Processing Order - The first packet intercepted will be the first to be processed/removed from the queue
- Manual Processing - Packets are not removed automatically from the queue
- User Action Required - Each packet must be manually forwarded or dropped by the user
- Sequential Handling - You must process the current (first) packet before accessing the next one in the queue
Queue Management Tips
- Monitor Queue Size - Keep an eye on the packet counter to avoid large queue buildup
- Process Promptly - Handle packets quickly to prevent session timeouts
- Clear Queue Regularly - Forward or drop packets to maintain smooth traffic flow
Auto-Forward on Intercept Disable
When you disable interception:
- Turn Off Intercept - Click the intercept button to turn OFF interception
- Automatic Queue Clearing - All packets currently in the queue will be automatically forwarded
- Immediate Processing - This provides a quick way to clear the entire queue at once
Session Management and Timeouts
Connection Timeouts
Session and connection timeouts are based on client, server, and protocol specifications:
- Protocol Dependent - Different protocols have varying timeout lengths
- Variable Duration - Some protocols have longer TCP session timeouts, others are shorter
- Client/Server Specific - Timeout behavior varies between different client and server implementations
Session Termination Handling
When you intercept a packet and hold it for too long:
- Automatic Termination - The server or client may terminate the session due to timeout
- Rejected Packets - Post-termination, forwarded packets will be rejected by server/client in most cases
- Auto-Detection - InterceptSuite automatically detects when an ongoing session is terminated
- Automatic Drop - Packets are automatically dropped when no active session exists
Best Practices
- Quick Analysis - Analyze and modify packets promptly to avoid session timeouts
- Monitor Session Status - Pay attention to session indicators in the interface
- Understand Protocol Limits - Be aware of the timeout characteristics of the protocols you're intercepting