26 February 2009 | 24,139 views

SSLstrip – HTTPS Stripping Attack Tool

Secure Your Website with Acunetix

This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. For more information on the attack, see the video from the presentation on the homepage.

To get this running:

  • Flip your machine into forwarding mode.
  • Setup iptables to redirect HTTP traffic to sslstrip.
  • Run sslstrip.
  • Run arpspoof to convince a network they should send their traffic to you.

That should do it.

How does this work?

First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).

At this point, sslstrip receives the traffic and does its magic.

You can download sslstrip 0.2 here:


Or read more here.


Recent in Hacking Tools:
- EyeWitness – A Rapid Web Application Triage Tool
- wig – WebApp Information Gatherer – Identify CMS
- Capstone – Multi-platform, Multi-architecture Disassembly Framework

Related Posts:
- ARPwner – ARP & DNS Poisoning Attack Tool
- Another 0-day MySpace XSS Exploit
- chapcrack – A tool for parsing and decrypting MS-CHAPv2 network handshakes.

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,844,588 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,030,055 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 613,183 views

Low-cost VPS Hosting

3 Responses to “SSLstrip – HTTPS Stripping Attack Tool”

  1. cbrp1r8 26 February 2009 at 3:23 pm Permalink

    I watched the video on his site after the hacker broke into his web site and posted the links on slashdot. :D

    Great video, recommend watching, the first portion is kinda boring but the more he gets into the exploit side and talking about the banking website the better it gets.

  2. supralova 27 February 2009 at 4:58 pm Permalink


  3. Hamilton 1 March 2009 at 8:27 pm Permalink

    Not an original ideia of Moxie Marlinspike himself. In fact you can implement the same trick by using a Reverse Proxy (locally) and launching your MITM attack using ARP spoof to fool the victims machine into thinking you are the local gateway.

    Keep in touch,