Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Not really an issue, question on sslstrip inside virtualbox #18

Closed
c0debreaker opened this issue Sep 30, 2016 · 2 comments
Closed

Not really an issue, question on sslstrip inside virtualbox #18

c0debreaker opened this issue Sep 30, 2016 · 2 comments

Comments

@c0debreaker
Copy link

Last night, I was doing a proof of concept of attacking my desktop machines at home. I have a linux running on a virtualbox and configured as bridged. Before I started the spoofing, I checked the connectivity and everything was reachable by ping

  1. from victim to gateway
  2. from victim to attacker
  3. from attacker to victim
  4. from attacker to gateway

They are all in the same subnet. So I've configured my linux with ip_forward enabled. I enabled it in sysctl.conf so that's persistent even if I restart the vm. The cat tool shows 1 on ip_forward. I also ran the iptables command. Then finally ran 2 arpspoof commands on the linux machine which is the attacker

  1. arpspoof -i eth0 -t victimip gatewayip
  2. arpspoof -i eth0 -t gatewayip victimip

Then finally ran sslstrip -l 8080

I went to the victim's machine then opened up Chrome browser. I went to google.com. It was waiting for a response. I didn't see anything thing getting logged on sslstrip. I think after 1 or 2 minutes, the browser showed an error. It was like "unable to communicate". I reloaded google again. It was waiting similar to how I mentioned it earlier. I killed both arpspoof commands and few seconds later, google webpage got displayed on the victim's browser. This tells us that arpspoof was working and that victim was sending to it. I'm just wondering why packets are not being forwarded to the gateway. Is this the behavior when attacker machine is in vm?

I'm going to retry again this time by building a linux on a real machine(not virtualbox) and I'll keep you posted. However, please let me know your thoughts on what I wrote above.

Thanks!

@Dikyx
Copy link

Dikyx commented Sep 30, 2016

Hi !
I also ran some tests using virtualbox one year ago.
Try using another (less secured) browser like IE on the Victim's computer. I also had some trouble while using Chrome, maybe it has a way to avoid such attacks.

I also found out Eset smart security prevents ARP poisoning attacks.

Hope it will work with IE !

Have a nice day =)

@c0debreaker
Copy link
Author

Ah! Thanks! I'll keep you posted tonight.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants