26 February 2009 | 25,171 views

SSLstrip – HTTPS Stripping Attack Tool

Don't let your data go over to the Dark Side!

This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. For more information on the attack, see the video from the presentation on the homepage.

To get this running:

  • Flip your machine into forwarding mode.
  • Setup iptables to redirect HTTP traffic to sslstrip.
  • Run sslstrip.
  • Run arpspoof to convince a network they should send their traffic to you.

That should do it.

How does this work?

First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).

At this point, sslstrip receives the traffic and does its magic.

You can download sslstrip 0.2 here:


Or read more here.


Recent in Hacking Tools:
- RWMC – Retrieve Windows Credentials With PowerShell
- MITMf – Man-In-The-Middle Attack Framework
- LaZagne – Password Recovery Tool For Windows & Linux

Related Posts:
- clipcaptcha – CAPTCHA Service Impersonation Tool
- Infernal Twin – Automatic Wifi Hacking Tool
- FruityWifi – Wireless Network Auditing Tool

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,954,858 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,334,461 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 666,132 views

Advertise on Darknet

3 Responses to “SSLstrip – HTTPS Stripping Attack Tool”

  1. cbrp1r8 26 February 2009 at 3:23 pm Permalink

    I watched the video on his site after the hacker broke into his web site and posted the links on slashdot. :D

    Great video, recommend watching, the first portion is kinda boring but the more he gets into the exploit side and talking about the banking website the better it gets.

  2. supralova 27 February 2009 at 4:58 pm Permalink


  3. Hamilton 1 March 2009 at 8:27 pm Permalink

    Not an original ideia of Moxie Marlinspike himself. In fact you can implement the same trick by using a Reverse Proxy (locally) and launching your MITM attack using ARP spoof to fool the victims machine into thinking you are the local gateway.

    Keep in touch,