Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/moxie0/sslstrip
A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
https://github.com/moxie0/sslstrip
Last synced: 15 days ago
JSON representation
A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
- Host: GitHub
- URL: https://github.com/moxie0/sslstrip
- Owner: moxie0
- License: gpl-3.0
- Created: 2011-04-24T06:40:08.000Z (over 13 years ago)
- Default Branch: master
- Last Pushed: 2021-05-29T01:53:12.000Z (over 3 years ago)
- Last Synced: 2024-08-01T16:38:13.009Z (3 months ago)
- Language: Python
- Homepage: http://www.thoughtcrime.org/software/sslstrip/
- Size: 507 KB
- Stars: 1,894
- Watchers: 129
- Forks: 426
- Open Issues: 27
-
Metadata Files:
- Readme: README
- License: COPYING
Awesome Lists containing this project
- awesome-termux-hacking - sslstrip - A tool for exploiting Moxie Marlinspike's SSL "stripping" attack..[![->](https://img.shields.io/github/stars/moxie0/sslstrip.svg?style=social&label=Star&maxAge=2592000)](https://github.com/moxie0/sslstrip/stargazers/) (Uncategorized / Uncategorized)
README
sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping
attacks.It requires Python 2.5 or newer, along with the 'twisted' python module.
Installing:
* Unpack: tar zxvf sslstrip-0.5.tar.gz
* Install twisted: sudo apt-get install python-twisted-web
* (Optionally) run 'python setup.py install' as root to install,
or you can just run it out of the directory.Running:
sslstrip can be run from the source base without installation.
Just run 'python sslstrip.py -h' as a non-root user to get the
command-line options.The four steps to getting this working (assuming you're running Linux)
are:1) Flip your machine into forwarding mode (as root):
echo "1" > /proc/sys/net/ipv4/ip_forward2) Setup iptables to intercept HTTP requests (as root):
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port
3) Run sslstrip with the command-line options you'd like (see above).4) Run arpspoof to redirect traffic to your machine (as root):
arpspoof -i -tMore Info:
http://www.thoughtcrime.org/software/sslstrip/