Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xPoly/Superphish
Script to silently intercept SSL on computers infected with Superfish malware
https://github.com/0xPoly/Superphish
Last synced: 13 days ago
JSON representation
Script to silently intercept SSL on computers infected with Superfish malware
- Host: GitHub
- URL: https://github.com/0xPoly/Superphish
- Owner: 0xPoly
- License: gpl-2.0
- Created: 2015-02-20T08:53:27.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2015-02-20T11:26:40.000Z (over 9 years ago)
- Last Synced: 2024-07-03T09:22:24.427Z (4 months ago)
- Language: Shell
- Size: 125 KB
- Stars: 28
- Watchers: 5
- Forks: 8
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Superphish
Peter Hortensius, Lenovo CTO, in an interview with Wall Street Journal:
> "We’re not trying to get into an argument with the security guys. They’re dealing with theoretical concerns."This script will silently intercept SSL connections made from computers infected with Superfish malware on the local network. All traffic will be logged into 'superphish.log'. Works in three stages:
* Activates packet forwarding
* ARP poisoning
* SSL interception with Superfish CA keysTo target all clients on network:
./superphish.sh interface gateway-ip
Specific target:./superphish.sh interface gateway-ip target-ip
Needed dependecies will be installed automatically at first run.
Thanks to:
* [Robbert Graham](https://twitter.com/erratarob) for the [Superfish certificate](http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html)
* [Moxie](https://twitter.com/moxie) for sslniff