This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. For more information on the attack, see the video from the presentation on the homepage.
To get this running:
- Flip your machine into forwarding mode.
- Setup iptables to redirect HTTP traffic to sslstrip.
- Run sslstrip.
- Run arpspoof to convince a network they should send their traffic to you.
That should do it.
How does this work?
First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).
At this point, sslstrip receives the traffic and does its magic.
You can download sslstrip 0.2 here:
Or read more here.
- Watcher – Passive Web Application Vulnerability Scanner
- Pentoo – Gentoo Based Penetration Testing Linux LiveCD
- Onapsis Bizploit v1.50 – SAP Penetration Testing Framework
- clipcaptcha – CAPTCHA Service Impersonation Tool
- ARPwner – ARP & DNS Poisoning Attack Tool
- Another 0-day MySpace XSS Exploit
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,901,171 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,126,112 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 639,079 views