Declined Posted April 4, 2015 Share Posted April 4, 2015 Darren says in the video with SSLstrip that it's just to turn it on and it should do the magic.How and what criterias must be met for it to work on a network?I've tried it and it doesn't give me anything.Cheers Quote Link to comment Share on other sites More sharing options...
crazyclown Posted April 4, 2015 Share Posted April 4, 2015 Most browsers today use HSTS so SSLstrip is pretty much useless. Quote Link to comment Share on other sites More sharing options...
dustbyter Posted April 4, 2015 Share Posted April 4, 2015 If your interested in seeing if an application is vulnerable to SSLStrip, fire up an HTTP proxy (like burp) and check the HTTP Response headers. If the respond contains a Strict-Transport-Security header, then the application is not going to work with SSLStrip. As mentioned above, most applications are now setting the HSTS header and thus this attack is not a viable one anymore. Quote Link to comment Share on other sites More sharing options...
Declined Posted April 4, 2015 Author Share Posted April 4, 2015 Most browsers today use HSTS so SSLstrip is pretty much useless. If your interested in seeing if an application is vulnerable to SSLStrip, fire up an HTTP proxy (like burp) and check the HTTP Response headers. If the respond contains a Strict-Transport-Security header, then the application is not going to work with SSLStrip. As mentioned above, most applications are now setting the HSTS header and thus this attack is not a viable one anymore. I see, is there other methods I should be aware of that are more modern? What infusions do you think are a must-have? Quote Link to comment Share on other sites More sharing options...
crazyclown Posted April 4, 2015 Share Posted April 4, 2015 I see, is there other methods I should be aware of that are more modern? What infusions do you think are a must-have? None for the Pineapple. Depends on what you want to do. If you have the storage capacity install them all and see what works for you. Quote Link to comment Share on other sites More sharing options...
ZaraByte Posted April 4, 2015 Share Posted April 4, 2015 You can use something like DNS2Proxy and SSLStrip2 i've heard and seen it works to get around HSTS Quote Link to comment Share on other sites More sharing options...
crazyclown Posted April 4, 2015 Share Posted April 4, 2015 You can use something like DNS2Proxy and SSLStrip2 i've heard and seen it works to get around HSTS Not any more, plus as LeonardoNve has deleted sslstrip2 I doubt there will be any updates. Quote Link to comment Share on other sites More sharing options...
mw3demo Posted April 5, 2015 Share Posted April 5, 2015 (edited) Interesting, did not know it got deleted due to a Spanish gag law. No idea what the gov thought they could achieve by doing so. "Cause the new gag law which criminalized the publication of 'offensive' security tools/techniques I have to delete this repository. You can find good forks on MITMf framework (https://github.com/byt3bl33d3r/MITMf) or MANA rogue AP (https://github.com/sensepost/mana)." On a side note, MITMf's dev is pretty active, and has plans for additional features (https://github.com/byt3bl33d3r/MITMf/issues) , and he also just did a presentation at Black Hat Asia. I posted a ticket to his repo to see if he was interested in porting to the MKV back in December. He seemed very interested and also by chance, had a MKV already. Some libs were missing that would need to be included, and some functionality would have to be scaled back due to being too resource intensive, but the main parts could work. He is currently waiting for feedback from Seb/Darren, but they may very well be well along with their own version, or some other problem with officially incorporating such thing legally, commercially, or maybe limitations of the CPU/RAM to get it right, I don't know. I also posted a ticket on Sebs suggestion tracker last month, but no news yet. I know both Darren and Seb have been traveling a bunch over the past few months, as well as working on the show, so fingers crossed we get some feedback on a new proxy one way or another. :) Links: MITMf blog: http://sign0f4.blogspot.it/ GitHub: https://github.com/byt3bl33d3r/MITMf MITMf ticket: https://github.com/byt3bl33d3r/MITMf/issues/31 (Closed pending feedback ) Wifi pineapple ticket: https://www.wifipineapple.com/index.php?portal&bugs&action=view&id=291 Edited April 6, 2015 by mw3demo Quote Link to comment Share on other sites More sharing options...
johnjdoe Posted April 5, 2015 Share Posted April 5, 2015 I can confirm that MITMf works fine against some SSL targets. When HSTS is used it depends on the browser too, but I can confirm that with an older version of Chrome an SSLStrip attack against mail.google.com accomplished his objectives. I hope that Seb will include a working MITM proxy in the Pineapple as promised ... Quote Link to comment Share on other sites More sharing options...
Declined Posted April 5, 2015 Author Share Posted April 5, 2015 Alot of interesting answers and thoughts.How would I go about when installing the MITMf?Thanks Quote Link to comment Share on other sites More sharing options...
m4rt1n Posted May 2, 2015 Share Posted May 2, 2015 Someone stll have the DNS2Proxy and SSLStrip2? Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.