You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A video of this bug can be seen here. Everything seems to carry out as intended until the very end, where the victim is unable to load the web page from the server. Attempting cat sslstrip.log on the hacker side will show that it doesn't contain the username and password of the victim.
Much of the info from this thread comes from my discussions with @liux0614.
By running pip show Twisted on the hacker side, you can see the version installed was 19.2.0 instead of 18.9.0. You don't see any errors when you run sslstrip -l 8080 &> /dev/null &. However, when you run sslstrip -l 8080 without &> /dev/null &, the problem becomes apparent to the user.
The Dockerfile for the hacker doesn't specify which version of Twisted is needed. This prevents the attack from working properly.
The text was updated successfully, but these errors were encountered: