{"id":3103,"date":"2011-07-01T09:49:01","date_gmt":"2011-07-01T08:49:01","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3103"},"modified":"2015-09-09T19:37:11","modified_gmt":"2015-09-09T11:37:11","slug":"sslsniff-v0-7-ssl-man-in-the-middle-mitm-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2011\/07\/sslsniff-v0-7-ssl-man-in-the-middle-mitm-tool\/","title":{"rendered":"sslsniff v0.7 – SSL Man-In-The-Middle (MITM) Tool"},"content":{"rendered":"

It’s been a while since the last sslsniff release back in August 2009 with version 0.6 – sslsniff v0.6 Released \u2013 SSL MITM Tool<\/a>. Version 0.7 was finally released earlier in the year in April – so here it is.<\/p>\n

This tool was originally written to demonstrate and exploit IE’s vulnerability to a specific “basicConstraints” man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes.<\/p>\n

It is designed to MITM all SSL connections on a LAN and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that you provide. <\/p>\n

The three steps to get this running are:<\/p>\n