SSLstrip – HTTPS Stripping Attack Tool

Find your website's Achilles' Heel


This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. For more information on the attack, see the video from the presentation on the homepage.

To get this running:

  • Flip your machine into forwarding mode.
  • Setup iptables to redirect HTTP traffic to sslstrip.
  • Run sslstrip.
  • Run arpspoof to convince a network they should send their traffic to you.

That should do it.


How does this work?

First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).

At this point, sslstrip receives the traffic and does its magic.

You can download sslstrip 0.2 here:

sslstrip-0.2.tar.gz

Or read more here.


Posted in: Hacking Tools, Network Hacking

, , , , , , , , , ,

Recent in Hacking Tools:
- PowerOPS – PowerShell Runspace Portable Post Exploitation Tool
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- UFONet – Open Redirect DDoS Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,986,543 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,454,379 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 683,797 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


3 Responses to SSLstrip – HTTPS Stripping Attack Tool

  1. cbrp1r8 February 26, 2009 at 3:23 pm #

    I watched the video on his site after the hacker broke into his web site and posted the links on slashdot. :D

    Great video, recommend watching, the first portion is kinda boring but the more he gets into the exploit side and talking about the banking website the better it gets.

  2. supralova February 27, 2009 at 4:58 pm #

    Good!!!

  3. Hamilton March 1, 2009 at 8:27 pm #

    Not an original ideia of Moxie Marlinspike himself. In fact you can implement the same trick by using a Reverse Proxy (locally) and launching your MITM attack using ARP spoof to fool the victims machine into thinking you are the local gateway.

    Keep in touch,

    2600@bol.com.br