SSL/TLS man-in-the-middle attack tool
sslsniff is designed to create man-in-the-middle (MITM) attacks for
SSL/TLS connections, and dynamically generates certs for the domains
that are being accessed on the fly. The new certificates are constructed
in a certificate chain that is signed by any certificate that is
sslsniff also supports other attacks like null-prefix or OCSP attacks to
achieve silent interceptions of connections when possible.
Moxie Marlinspike <email@example.com>
REQUIRES: openssl, libboost1.35-dev, libboost-filesystem1.35-dev,
libboost-thread1.35-dev, liblog4cpp5-dev, Linux 2.4/2.6
The three steps to get this running are:
* Download and run sslsniff-0.6.tar.gz
* Setup iptables
* Run arpspoof (or whatever method you'd like to use to redir
sslsniff - SSL/TLS man-in-the-middle attack tool
This manual page documents briefly the sslsniff command.
sslsniff is designed to create man-in-the-middle (MITM)
attacks for SSL/TLS connections, and dynamically generates
sslsniff (0.6-1+b1) unstable; urgency=low
* Binary-only non-maintainer upload for armel; no source changes.
* Rebuild with new boost-defaults
-- armel Build Daemon (arcadelt) <firstname.lastname@example.org> Sun, 02 May 2010 23:21:23 +0000
sslsniff (0.6-1) unstable; urgency=low
* Initial release (Closes: #542472)
-- Pierre Chifflier <email@example.com> Sun, 16 Aug 2009 22:3
* Added support for null prefix attack vulnerability.
* Added support for
This package was debianized by Pierre Chifflier <firstname.lastname@example.org> on
Sun, 16 Aug 2009 22:39:51 +02
Browse inside sslsniff_0.6-1+b1_armel.deb
Results 1 - 1 of 1Search over 15 billion files
© 1997-2017 FileWatcher.com