0

I just started learning MITM attacks and I use MITMF to perfom these attacks. I have one question regarding to sslstrip. I notice that sslstrip only works when we first clear the cache and history in our victim's browser. Is this always the case? Or is there any workarounds for this?

I've been thinking of maybe doing a dns spoof and then running a script to clear all the cookies in the browser but I'm not sure if this will works.

edit : I do understand that sslstrip wont work on HSTS websites but will it work without having the victim to clear their cookies first?

1 Answers1

1

I do understand that sslstrip wont work on HSTS websites but will it work without having the victim to clear their cookies first?

This is completely unrelated to cookies.

SSLStrip works as long the browser thinks that the site can be accessed by plain HTTP. If the site response with HSTS or has pre-loaded HSTS the browser knows to access the site next time or even first time with HTTPS.

Similar if the site issues a 301 permanent redirect to HTTPS the browser will next time skip the plain HTTP request and access this new HTTPS-URL directly (affects only the specific URL and not the whole site). I think you are confusing this 301 with the cookies.

Steffen Ullrich
  • 201,479
  • 30
  • 402
  • 465