This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. For more information on the attack, see the video from the presentation on the homepage.
To get this running:
- Flip your machine into forwarding mode.
- Setup iptables to redirect HTTP traffic to sslstrip.
- Run sslstrip.
- Run arpspoof to convince a network they should send their traffic to you.
That should do it.
How does this work?
First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).
At this point, sslstrip receives the traffic and does its magic.
You can download sslstrip 0.2 here:
Or read more here.
- Radare – The Reverse Engineering Framework
- ZMap – Fast Open-Source Network Scanner
- Arachni v1.0 Released – Web Application Security Scanner Framework
- clipcaptcha – CAPTCHA Service Impersonation Tool
- ARPwner – ARP & DNS Poisoning Attack Tool
- Another 0-day MySpace XSS Exploit
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,874,864 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,069,110 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 627,237 views