![]() |
2013-01-24
, 21:15
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#11
|
The Following User Says Thank You to szopin For This Useful Post: | ||
![]() |
2013-02-06
, 19:33
|
Posts: 238 |
Thanked: 131 times |
Joined on May 2011
@ Bulgaria
|
#12
|
orginally posted by mr_pingu
I don't have the time to write a detailed guide now, but generally ettercap is only used to arp poison the network you are targetting. From there you use sslstrip to sniff secured connection.
It should work with both -e option and normal, as ettercap is only used to ARP poison and rest is done by sslstrip. Anyway somehow it's impossible to sniff maemo.org passwords and login (easily).
"Both use HSTS headers now, so if you're using a browser that supports them (like Chrome,or firefox),there's no opportunity for sslstrip to do anything. That output is from Twisted,and it doesn't indicate any actual problem."
"HSTS fixes this problem by informing the browser that connections to the site should always use SSL. Of course, the HSTS header can be stripped by the attacker if this is the user's first visit.Chrome attempts to limit this problem by including a hard-coded list of HSTS sites.Unfortunately this solution cannot scale to include all websites on the internet; a more workable solution can be achieved by including HSTS data inside DNS records, and accessing them securely via DNSSEC."
The Following User Says Thank You to disappear For This Useful Post: | ||