This tool was originally written to demonstrate and exploit IE’s vulnerability to a specific “basicConstraints” man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to act as signing certificates, this tool is still occasionally useful for other purposes.
It is designed to MITM all SSL connections on a LAN and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that you provide.
The three steps to get this running are:
- Download and run sslsniff-0.7.tar.gz
- Setup iptables
- Run arp-spoof
- Fixed some networking shuffling bugs (thanks Daniel Roethlisberger)
- Added basic compatibility with BSD pf (thanks Daniel Roethlisberger)
sslsniff-0.7.tar.gz
0 comments:
Post a Comment