Approx a year back, Mozilla added a new feature “Captive Portal” support to Firefox browser in an attempt to enhance usability when connecting to free Wi-Fi portals.
Captive Portal feature covers the detection and implementation of handles for captive portals inside Firefox browser. Firefox is expected to handle the handling of a captive portal page upon detection of such. Certain business logic related to the detection and management of a captive portal is expected to be in place and documented in the Specs section.
Also Read: [Solution] SSL Handshake Alert Error – Burp Suite
This feature is really annoying when it comes to using Burp Suite as a proxy for Firefox. Because if you are a pentester, you are probably used using Firefox for traffic interception through Burp Intercept but along with normal requests, you may seen a lot of GET requests of /success.txt as shown below:
Seeing all those requests in Burp, much less thinking about all the noise they generate otherwise, is annoying. Because you probably won’t ever need to use a Captive Portal on your pentesting machine.
Open your Mozilla Firefox browser, and type “about:config” and click on “I accept the risk!” as shown in below screen.
Search “captive-portal” in the search bar and you’ll see some entries related to captive portal named as “network.captive-portal-service.enabled” whose default value is false and you just need to double click on the following entry to set it true.
You may also like:- Most Common DNS Record Types and Their Roles
- Top Skills Needed to Become a Cybersecurity Analyst
- Mastering Windows Management with WMIC Commands – Top 20 Examples
- Edit and Compile Code with the Best 5 Code Editors
- 50+ Top DevSecOps Tools You Need To Know
- Learn How to Add Proxy and Multiple Accounts in MoreLogin
- Some Useful PowerShell Cmdlets
- Create Free SSL Certificate – ZEROSSL.COM [2020 Tutorial]
- Generate Self-Signed SSL Certificate with OPENSSL in Kali Linux
- RDP – CredSSP Encryption Oracle Remediation Solution 2020
Actually, for me works exactly the opposite way, it was true by default and needs to be set “false” to work on burp.
for me, it is not working despite setting it false
please help
You can also try the below solution to fix above said –
When you get any request from “detectportal.firefox.com” in BurpSuite, click the “Action” button, followed by “Do not intercept…”, and choose “requests to this host”.
This should solve the problem without modifying Firefox.