Hacking SSL in LAN using arp-poising with sslstrip

 Helo, everyone this time I am going to explain how to bypass SSL security using arp-poising with sslstrip. I am going to use BACKTRACK 5 and ettercap for this tutorial..

I am going to explain this attack step by step

This type of attack is done for a specific victim and have an drawback, but still have more than 80% success rate. When we type gmail.com then your request is sent on port 80 from where it is redirected to port 443 at gmail server. In this attack we will come in the middle and then accept all request at port 80 and then redirect it to port 443.

This attack is also known as MAN IN THE MIDDLE ATTACK or ARP POISONING  ATTACK.

To do this attack follow the following steps………

Note:- backtrack is case sensitive so use the correct case. 

 

Before going to start attack make sure your networking on your system is running to do that use

service networking start

Step 1:- Flip your machine in forwarding mode.

echo 1 > /proc/sys/net/ipv4/ip_forward

 1

once your machine is in forwarding mode It will be able to accept and forward that request to desired location.

step 2:- Setup ip table to intercept HTTP request:-

iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 1000

2

 In this step we are configuring our machine to accept request of port 80 and forward it to port 1000.

step 3:- Check your network or sebnet using ifconfig command3

 In this example my network is 192.168.56.0/24

If you are using windows for this attack then use ipconfig command to check your network.

step 4:- find out IP of Target PC and Router using nmap.

nmap -sP 192.168.56.0/24

 4

nmap is a scanner utility you can use any other if you want i prefer nmap……

generally xx.xx.xx.1 is your router’s IP address.

step 5:- Run arpspoof to convince a network it should send their network traffic to your machine:

 arpspoof -i eth0 -t Target’s IP Router’s IP

 5

now your attack has started don’t stop it or close this terminal.

step 6:- start sslstrip from backtrack –> Exploitation Tools –> web Exploitation –> sslstrip?

 6

a new terminal will start don’t close previous one….

give the following command in the new terminal.

python sslstrip.py -l 1000

 7

this command will send all traffic from source port 1000 to destination port 443(ssl port)

don’t close this terminal start another terminal and follow the remaining steps

now attack is done.

step 7:- start any sniffer and capture all data.

I prefer ettercap so I will start ettercap

ettercap -Tq -i eth0

where eth0 is my interface name you can see it using ifconfig. 

 8

now sit and watch all the activity victim is doing

How does it work?

when user will type www.facebook.com it will send the request to attacker on port 80 where attacker will forward it to facebook.com on port 443 and then we will receive reply from the facebook and will create a ssl tunnel with facebook but point to be noted is it is attacker who is creating ssl tunnel with facebook not the victim.

in simple work for the victim attacker is the www.facebook.com and for the facebook.com attacker is the user who is logging in.

 At the victim PC

10

when the victim press enter or click on login then all data are sent to attacker in clear text form…

9

sorry for that but I can’t show my pass and username everything will be in the clear text.

Most importantly victim have no Idea that he has been hacked because in the victim’s PC everything is going well

11

I try to make it as simple as I can, but if you still have any problem or any type of doubt you can ask????

I have uploaded an video also for reference:

 

Add a Comment