SSl stripping with SSLstrip and Arpspoof

SSL Stripping is a technique by which a website is downgraded from https to http. With standard SSL man-in-the-middle attacks, users have to click through the SSL certificate warning. Depending on the browser, this can be an involved process that is difficult, if not impossible, for a user to ignore. Most readers can probably think of a time they clicked through a security warning and continued to the page despite their better judgment. With SSL stripping, we man-in-the-middle the HTTP connection before it is redirected to SSL and add SSL functionality before sending the packets on to the web server. When the web server replies, SSL stripping again intercepts the traffic and removes the HTTPS tags before sending the packets to the client. Continue reading “SSl stripping with SSLstrip and Arpspoof”

Using Ettercap for SSL Man-in-the-Middle Attacks

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. This tool allows us to perform MiTM attack with ARP spoofing andĀ attack SSL traffic. We can break the secure SSL connection by redirecting traffic to and from www .facebook.com to our Kali system so we can intercept sensitive information. Continue reading “Using Ettercap for SSL Man-in-the-Middle Attacks”