{"id":1533,"date":"2009-02-26T08:51:22","date_gmt":"2009-02-26T08:51:22","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1533"},"modified":"2015-09-09T19:39:01","modified_gmt":"2015-09-09T11:39:01","slug":"sslstrip-https-stripping-attack-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/02\/sslstrip-https-stripping-attack-tool\/","title":{"rendered":"SSLstrip – HTTPS Stripping Attack Tool"},"content":{"rendered":"

This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009<\/a>. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. For more information on the attack, see the video from the presentation on the homepage<\/a>.<\/p>\n

To get this running:<\/p>\n