SSLStrip attack


  • This application demonstrates an man-in-the-middle attack that fools a victim into communicating via plain-text HTTP; enabling a hacker to obtain sensitive information.

  • This application assumes that you are already familiar with Arpspoof. If not please visit our Arpspoof demonstration page first click here.
  • In this demonstration, three containers will be created for you; one each for the server, victim and hacker.

  • The hacker container comes preloaded with the arpspoof and sslstrip applications that you will need to run to perform the attack.

  • The victim container is a web emulation of a basic Ubuntu Linux machine. It contains a Linux terminal and the Firefox web browser that you will need.

  • Briefly, a hacker running SSLStrip (website) intercepts HTTPS traffic from the server to the victim, replacing HTTPS links with HTTP. It also adds back the SSL headers, fooling the server and victim into thinking they are still communicating over HTTPS.

  • If the victim follows any of these HTTP links, they will now be communicating via cleartext with the hacker.

  • In this demonstration, you will be asked to enter login information in a webpage presented by the server while the hacker is running the SSLStrip application.

  • While the communication is over HTTPS the first time, if the victim simply enters the webpage address in the browser the second time (assuming an automatic redirection to HTTPS), they will be fooled into revealing their login and password information to the hacker.



  • Ready to go? Try It !
  • Note: You will have around 20 minutes to test this application.