View Issue Details

IDProjectCategoryView StatusLast Update
0000679Kali LinuxTool Upgrade Requestpublic2015-12-09 17:17
Reporterxtr4nge Assigned Torhertzog  
PrioritynormalSeverityminorReproducibilityalways
Status closedResolutionfixed 
Summary0000679: SSLStrip fork
Description

This fork can inject code into HTML pages using a text file only.

Option: -i , --inject Inject HTML code (default inject.txt).
Example: sslstrip -i inject.txt

This fork can also perform response tampering attacks.
One prepared example of tampering attack is HTML5 AppCache poisoning attack that places the
modified responses in browsers long-lasting HTML5 AppCache so that the spoofing continues
even after the victim is no longer MITMed.

Option: -t <config>, --tamper <config> Enable response tampering with settings from <config>.
Example: sslstrip -t app_cache_poison/config.ini

Download: https://github.com/xtr4nge/module_sslstrip

Steps To Reproduce

Option: -i , --inject Inject HTML code (default inject.txt).
Example: sslstrip -i inject.txt

Option: -t <config>, --tamper <config> Enable response tampering with settings from <config>.
Example: sslstrip -t app_cache_poison/config.ini

Additional Information

This functionality has been added by @xtr4nge <xtr4nge [AT] gmail.com> and Krzysztof Kotowicz <kkotowicz [AT] gmail.com>

Activities

rhertzog

rhertzog

2015-09-03 13:55

administrator   ~0003939

Is this fork still needed? Or can we close this ticket?

rhertzog

rhertzog

2015-12-09 17:17

administrator   ~0004394

This has already been packaged as fruitywifi-module-sslstrip.

Issue History

Date Modified Username Field Change
2013-10-30 22:06 xtr4nge New Issue
2015-09-03 13:55 rhertzog Note Added: 0003939
2015-09-03 13:55 rhertzog Status new => feedback
2015-12-09 17:17 rhertzog Note Added: 0004394
2015-12-09 17:17 rhertzog Status feedback => closed
2015-12-09 17:17 rhertzog Assigned To => rhertzog
2015-12-09 17:17 rhertzog Resolution open => fixed
2021-05-31 13:37 rhertzog Category Tool Upgrade => Tool Upgrade Request