{"id":9650,"date":"2013-03-28T21:41:14","date_gmt":"2013-03-29T02:41:14","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=9650"},"modified":"2013-03-28T21:41:14","modified_gmt":"2013-03-29T02:41:14","slug":"sslstrip-tutorial","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=9650","title":{"rendered":"Sslstrip Tutorial"},"content":{"rendered":"<blockquote><p><b>Description:<\/b> <a href=\"http:\/\/www.thoughtcrime.org\/software\/sslstrip\/index.html\" target=\"_blank\">SSLstrip<\/a> was released by Moxie to demonstrate the vulnerabilities he spoke about at <a href=\"http:\/\/securitytube.net\/Defeating-SSL-using-SSLStrip-%28Marlinspike-Blackhat%29-video.aspx\" target=\"_blank\">Blackhat 2009<\/a>. In this video we will look at how to get started with SSLstrip. We setup 2 vmware machines, one running Widnows XP (victim) and the other Backtrack 3 (Attacker). Before we actually begin hacking using SSLstrip, we need to setup the entire Man in the Middle Mechanism and packet redirection \/ forwarding mechanism. We do this by using the following commands in sequence:<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.securitytube.net\/video\/193\">Sslstrip Tutorial<\/a>.<\/p>\n<p>This tool assumes a man in the middle setup and that http traffic (port 80) gets redirected to a port sslstrip listens to on the attacker&#8217;s machine (port 10000 in this video).\u00a0 Sslstrip then intercepts https traffic and returns to the victim http traffic.\u00a0 The victim thinking his traffic is encrypted is\u00a0 transmitting in plain text while sslstrip manages the ssl session with the victim&#8217;s destination (i.e. bank).\u00a0 Since this attack is using http the victim does not need to validate an ssl certificate thus it&#8217;s transparent.\u00a0 Detecting this attack is simple because the browser returns http in the displayed url instead of https so an alert victim should know.\u00a0 But not everyone may notice this.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: SSLstrip was released by Moxie to demonstrate the vulnerabilities he spoke about at Blackhat 2009. In this video we will look at how to get started with SSLstrip. We setup 2 vmware machines, one running Widnows XP (victim) and &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=9650\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[110],"tags":[340,101,232,87],"class_list":["post-9650","post","type-post","status-publish","format-standard","hentry","category-networking","tag-mitm","tag-security","tag-ssl","tag-tools"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9650"}],"version-history":[{"count":0,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/9650\/revisions"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9650"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}