26 February 2009 | 24,612 views

SSLstrip – HTTPS Stripping Attack Tool

Check Your Web Security with Acunetix

This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. For more information on the attack, see the video from the presentation on the homepage.

To get this running:

  • Flip your machine into forwarding mode.
  • Setup iptables to redirect HTTP traffic to sslstrip.
  • Run sslstrip.
  • Run arpspoof to convince a network they should send their traffic to you.

That should do it.

How does this work?

First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).

At this point, sslstrip receives the traffic and does its magic.

You can download sslstrip 0.2 here:


Or read more here.


Recent in Hacking Tools:
- XSSYA v2.0 Released – XSS Vulnerability Confirmation Tool
- wig – CMS Identification & Information Gathering Tool
- Appie – Portable Android Security Testing Suite

Related Posts:
- clipcaptcha – CAPTCHA Service Impersonation Tool
- ARPwner – ARP & DNS Poisoning Attack Tool
- Another 0-day MySpace XSS Exploit

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,897,020 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,114,836 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 637,422 views

Low-cost VPS Hosting

3 Responses to “SSLstrip – HTTPS Stripping Attack Tool”

  1. cbrp1r8 26 February 2009 at 3:23 pm Permalink

    I watched the video on his site after the hacker broke into his web site and posted the links on slashdot. :D

    Great video, recommend watching, the first portion is kinda boring but the more he gets into the exploit side and talking about the banking website the better it gets.

  2. supralova 27 February 2009 at 4:58 pm Permalink


  3. Hamilton 1 March 2009 at 8:27 pm Permalink

    Not an original ideia of Moxie Marlinspike himself. In fact you can implement the same trick by using a Reverse Proxy (locally) and launching your MITM attack using ARP spoof to fool the victims machine into thinking you are the local gateway.

    Keep in touch,