From ef328720e53b9b6a8eba3ec201369a3403f16147 Mon Sep 17 00:00:00 2001 From: Lee Baird Date: Thu, 25 Nov 2021 11:09:28 -0600 Subject: [PATCH] Cleaned up instructions. --- README.md | 25 ++++++++++++++----------- 1 file changed, 14 insertions(+), 11 deletions(-) diff --git a/README.md b/README.md index cf9b805..80f574c 100755 --- a/README.md +++ b/README.md @@ -1,23 +1,26 @@ sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks. -Ported from Python v2 to v3 by Jay Townsend (theHarvester, Discover and DNSrecon). +Ported from Python v2 to v3 by Jay Townsend (theHarvester, Discover, and DNSrecon). * [![Twitter Follow](https://img.shields.io/twitter/follow/jay_townsend1.svg?style=social&label=Follow)](https://twitter.com/jay_townsend1) Jay "L1ghtn1ng" Townsend @jay_townsend1 -Installing: - pip3 install -r requirements.txt - Run 'python setup.py install' as root to install or run it out of the directory. +Requirements: + ```pip3 install -r requirements.txt``` -Running: +Run as root to install or run it out of the directory: + ```python3 setup.py install``` + +Running: sslstrip can be run from the source base without installation. - Run 'python3 sslstrip.py -h' as a non-root user to get the command-line options. + Run as a normal user to see options. + ```python3 sslstrip.py -h``` - 1. Enable IP forwarding (as root):
+ 1. As root, enable IP forwarding:
```echo "1" > /proc/sys/net/ipv4/ip_forward``` - 2. Setup iptables to intercept HTTP requests (as root):
- ```iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port ``` + 2. As root, setup iptables to intercept HTTP requests:
+ ```iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port ``` 3. Run sslstrip with the options you prefer. - 4. Run arpspoof to redirect traffic to your machine (as root):
- ```arpspoof -i -t ``` + 4. As root, run arpspoof to redirect traffic to your host:
+ ```arpspoof -i -t ```