Quick Start
Get InterceptSuite running in under 5 minutes.
Step 1: Launch InterceptSuite​
When you launch the InterceptSuite application, it automatically:
- Opens SOCKS5 TCP proxy on
127.0.0.1:4444
- Opens UDP relay port on
127.0.0.1:4445
You should see the application interface with these services running in the background.
Step 2: Install CA Certificate (Required)​
If you are installing InterceptSuite for the first time or updating to a new version, you must install the CA certificate into your system for TLS interception to work properly.
Export Certificate from InterceptSuite​
- In the InterceptSuite application, navigate to the "Proxy" tab
- Go to "Settings" tab within the Proxy section
- In the "Certificate Management" section, click "Export Certificate"
- Select DER format for the certificate export
- Choose your preferred export directory
- Save the certificate file
Install Certificate by Platform​
Windows Installation​
- Locate the exported certificate file (
.cer
or.der
) - Double-click on the certificate file
- Click "Install Certificate..."
- Select "Local Machine" (not Current User)
- Choose "Place all certificates in the following store"
- Click "Browse" and select "Trusted Root Certification Authorities"
- Click "Next" and "Finish"
- Click "Yes" when prompted with security warning
- You should see "The import was successful"
macOS Installation​
- Locate the exported certificate file
- Double-click the certificate to open Keychain Access
- The certificate will be added to "login" keychain
- Find the certificate in Keychain Access
- Double-click the certificate to open settings
- Expand "Trust" section
- Set "Secure Sockets Layer (SSL)" to "Always Trust"
- Close the window and enter your admin password
Linux Installation​
For Ubuntu/Debian:
# Copy certificate to system certificate directory
sudo cp certificate.der /usr/local/share/ca-certificates/interceptsuite.der
# Update certificate store
sudo update-ca-certificates
For CentOS/RHEL/Fedora:
# Copy certificate to system certificate directory
sudo cp certificate.der /etc/pki/ca-trust/source/anchors/interceptsuite.der
# Update certificate store
sudo update-ca-trust
For Arch Linux:
# Copy certificate to system certificate directory
sudo cp certificate.der /etc/ca-certificates/trust-source/anchors/interceptsuite.der
# Update certificate store
sudo trust extract-compat
Step 3: Configure Your Application​
InterceptSuite uses the SOCKS5 protocol because it supports both HTTP and non-HTTP traffic directly. Traditional HTTP proxies by default do not support non-HTTP traffic, which is why InterceptSuite focuses on SOCKS5 to provide comprehensive network interception capabilities.
Windows Configuration​
Important: Windows does not natively support SOCKS5 proxy in its system settings. If you navigate to Windows Settings → Network & Internet → Proxy, you'll only find HTTP proxy support.
Recommended Solution: Use Proxifier for system-wide SOCKS5 proxy support:
- Download Proxifier from https://www.proxifier.com/
- Install and launch Proxifier
- Go to Profile → Proxy Servers
- Click "Add" and configure:
- Address:
127.0.0.1
- Port:
4444
- Protocol: SOCKS Version 5
- Address:
- Click "OK" to save
- Go to Profile → Proxification Rules
- Add rules for the applications you want to intercept
- Enable proxification and start intercepting traffic
macOS Configuration​
Option 1: Native System Settings
- Open System Preferences → Network
- Select your active network connection (Wi-Fi or Ethernet)
- Click "Advanced"
- Navigate to the "Proxies" tab
- Check "SOCKS Proxy"
- Enter:
- SOCKS Proxy Server:
127.0.0.1:4444
- SOCKS Proxy Server:
- Click "OK" and "Apply"
Option 2: Proxifier (Recommended for advanced control)
- Download Proxifier from https://www.proxifier.com/
- Follow the same configuration steps as Windows above
Linux Configuration​
Option 1: System-wide Proxy (GNOME/KDE)
For GNOME (Ubuntu, Fedora):
- Open Settings → Network
- Click "Network Proxy"
- Select "Manual"
- In "Socks Host" field, enter:
127.0.0.1
- In "Port" field, enter:
4444
- Click "Apply"
For KDE (openSUSE, Kubuntu):
- Open System Settings → Network → Proxy
- Select "Manually specify proxy configuration"
- In "SOCKS proxy" field, enter:
127.0.0.1:4444
- Click "Apply"
Option 2: Environment Variables
# Set SOCKS5 proxy for current session
export ALL_PROXY=socks5://127.0.0.1:4444
export all_proxy=socks5://127.0.0.1:4444
# For specific applications
export HTTPS_PROXY=socks5://127.0.0.1:4444
export HTTP_PROXY=socks5://127.0.0.1:4444
Option 3: Application-specific Configuration
For Firefox:
- Open Preferences → General → Network Settings
- Select "Manual proxy configuration"
- In "SOCKS Host", enter:
127.0.0.1
Port:4444
- Select "SOCKS v5"
- Check "Proxy DNS when using SOCKS v5"
Application-Specific Configuration​
Some applications allow direct SOCKS5 proxy configuration:
- Proxy Host:
127.0.0.1
- Proxy Port:
4444
- Proxy Type: SOCKS5
Step 4: Start Intercepting​
- Configure your target application to use the SOCKS5 proxy
- Start making network requests from your application
- Monitor traffic in real-time through the InterceptSuite interface
- Analyze captured data using the built-in tools