Here is my first attempt to package the latest sslstrip utility :
Sslstrip :
Transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects.
Overview :
This tool provides a demonstration of the HTTPS stripping attacks presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial.
How does this work?
First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).
At this point, sslstrip receives the traffic and does its magic.
Download packages from extra-devel :
Activate all repositories following this tutorial :Repositories Activation
Then, as usual, as root, install with :
Code:
-bash-2.05b# apt-get install sslstrip && sslstrip --help
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
sslstrip
0 upgraded, 1 newly installed, 0 to remove and 12 not upgraded.
Need to get 0B/24,6kB of archives.
After this operation, 188kB of additional disk space will be used.
Selecting previously deselected package sslstrip.
(Reading database ... 38855 files and directories currently installed.)
Unpacking sslstrip (from .../sslstrip_0.9-0maemo1_all.deb) ...
Setting up sslstrip (0.9-0maemo1) ...
sslstrip 0.9 by Moxie Marlinspike
Usage: sslstrip <options>
Options:
-w <filename>, --write=<filename> Specify file to log to (optional).
-p , --post Log only SSL POSTs. (default)
-s , --ssl Log all SSL traffic to and from server.
-a , --all Log all SSL and HTTP traffic to and from server.
-l <port>, --listen=<port> Port to listen on (default 10000).
-f , --favicon Substitute a lock favicon on secure requests.
-k , --killsessions Kill sessions in progress.
-h Print this help message.
-bash-2.05b#
After successful installation, just use it !!!
Hope you like it ...
A++
PS : Thanks to thopiekar for the original packaging !!! (You can see history here).
Here is my first attempt to package the latest sslstrip utility :
Sslstrip :
Transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects.
Overview :
This tool provides a demonstration of the HTTPS stripping attacks presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which looks like a lock icon, selective logging, and session denial.
How does this work?
First, arpspoof convinces a host that our MAC address is the router’s MAC address, and the target begins to send us all its network traffic. The kernel forwards everything along except for traffic destined to port 80, which it redirects to $listenPort (10000, for example).
At this point, sslstrip receives the traffic and does its magic.
Download packages from extra-devel :
Activate all repositories following this tutorial : Repositories Activation
Then, as usual, as root, install with :
Hope you like it
A++
PS : Thanks to thopiekar for the original packaging !!!