Hide Forgot
Description of problem: When running the sslstrip it works, but throws bunch of python errors. Scenario: victim---->sslstrip gateway----->target Version-Release number of selected component (if applicable): How reproducible: 100% Steps to Reproduce: 1. yum install sslstrip 2. redirect 80 to local gateway echo "1" > /proc/sys/net/ipv4/ip_forward iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080 3. poison victims arpcache sudo ettercap -i eth0 -TqM arp:remote /192.168.1.110/ /192.168.1.3/ 4. run sslstrip sslstrip -l 8080 5. use browser on 192.168.1.110 to browse to http://192.168.1.3/ Actual results: works but throws errors Expected results: should work without errors Additional info: attached error log
Created attachment 541469 [details] sslstrip_error.txt sslstrip errors
I am unable to reproduce on my machine, is there any more information you might be able to provide me about your setup/test so that I can try and find the issue as well? Thanks, -AdamM
Bump for more info. If I don't hear back in a couple weeks I'm going to close this. -AdamM
I can confirm this bug does exist. I am using the 64-bit version of Fedora 16. Packages I'm using shown by yum deplist sslstrip are: package: sslstrip.noarch 0.9-2.fc16 dependency: /usr/bin/python provider: python.x86_64 2.7.3-4.fc16 provider: python.i686 2.7.3-4.fc16 dependency: python(abi) = 2.7 provider: python.x86_64 2.7.3-4.fc16 provider: python.i686 2.7.3-4.fc16 dependency: python-twisted-web provider: python-twisted-web.x86_64 11.0.0-1.fc16 Steps to produce are the about the same: echo "1" > /proc/sys/net/ipv4/ip_forward vim /etc/syscontrol/iptables # Open a listening port iptables-restore < /etc/sysconfig/iptables iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080 arpspoof -i wlan1 192.168.0.1 sslstrip -l 8080
Created attachment 651293 [details] python errors generated by running sslstrip
Fedora 16 changed to end-of-life (EOL) status on 2013-02-12. Fedora 16 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. Thank you for reporting this bug and we are sorry it could not be fixed.