![]() |
[ANNOUNCE] sslstrip ...
Hi all,
Here is my first attempt to package the latest sslstrip utility : Sslstrip : Transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects. Overview : This tool provides a demonstration of the HTTPS stripping attacks presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial. How does this work? First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example). At this point, sslstrip receives the traffic and does its magic. Download packages from extra-devel : Activate all repositories following this tutorial : Repositories Activation Then, as usual, as root, install with : Code:
-bash-2.05b# apt-get install sslstrip && sslstrip --help Hope you like it :) ... A++ PS : Thanks to thopiekar for the original packaging !!! ;) (You can see history here). |
All times are GMT. The time now is 23:27. |
vBulletin® Version 3.8.8