sslsniff
sslsniff is an SSL/TLS man-in-the-middle attack tool that dynamically generates certificates for intercepted domains. It supports silent interceptions via attacks like null-prefix or OCSP.
Description
sslsniff creates man-in-the-middle (MITM) attacks for SSL/TLS connections by dynamically generating certificates for accessed domains on the fly. These certificates form a chain signed by a provided certificate, enabling interception of encrypted traffic.
The tool operates in authority mode with a CA certificate or targeted mode with a directory of certificates. It requires specifying a listening port for SSL interception and a log file. Additional features include HTTP interception for fingerprinting and browser-specific targeting.
Use cases include testing SSL/TLS security in controlled environments, demonstrating MITM vulnerabilities, and analyzing encrypted traffic with generated certificates. It also supports attacks like denying OCSP requests for silent interceptions.
How It Works
sslsniff performs MITM on SSL/TLS by acting as a proxy, dynamically constructing certificate chains signed by a user-provided CA or target certificates. In authority mode (-a), it uses a single CA cert/key; in targeted mode (-t), it selects from a directory of certs/keys. It listens on specified ports for SSL (-s) and optionally HTTP (-h) traffic, logs interceptions to a file (-w), and supports techniques like null-prefix or OCSP attacks (-d) for bypassing checks. Browser fingerprinting (-f) and addon injection (-j) enable targeted exploitation.
Installation
sudo apt install sslsniffFlags
Examples
sslsniff -hsslsniff -a -c ca_cert.pem -s 443 -w /tmp/ssl.logsslsniff -t -c /path/to/certs -s 993 -w capture.logsslsniff -c ca.pem -s 443 -h 80 -w log.txt -f ffsslsniff -c certs/ -s 443 -w output.log -d -psslsniff -a -c ca_chain.pem -s 993 -w imap.log -m intermediates.pemsslsniff -c certdir/ -s 443 -w log -e https://addons.mozilla.org