I did all the configuration right. IPtables, port forwarding, ARPspoof, everything.
However, in the browser websites like Facebook and Twitter are still HTTPS.
What am I doing wrong?
Asked
Active
Viewed 420 times
4
2 Answers
4
Pick a softer target.
Update 1
So: Pick a target that doesn't use HSTS and/or pick a browser that doesn't care about HSTS.
StackzOfZtuff
- 17,923
- 1
- 51
- 86
-
I don't want to hack someone. i want to learn. how can i bypass this HSTS? – Antonio Oct 31 '15 at 13:22
-
1@Antonio: HSTS is intended as protection against sslstrip etc, so no bypass of HSTS with sslstip, especially not HSTS preload. – Steffen Ullrich Oct 31 '15 at 13:25
-
@SteffenUllrichs Oh .. alright. so all the websites here https://chromium.googlesource.com/chromium/src/net/+/master/http/transport_security_state_static.json#1401 will not be http ever ? And there is a way to bypass HSTS? not with SSLSTRIP. – Antonio Oct 31 '15 at 13:27
-
@SteffenUllrich what about mitmf? – Antonio Oct 31 '15 at 13:42
-
@Antonio: MITM works only if the CA is already trusted by the browser. If HSTS is used the certificate warnings does not allow override by the user. – Steffen Ullrich Oct 31 '15 at 13:53
-
@Antonio: Answer updated. – StackzOfZtuff Oct 31 '15 at 14:09
-
@StackzOfZtuff I even tried internet explorer. doesn't work on facebook/Twitter . – Antonio Oct 31 '15 at 14:17
-
IE11 and IE-Edge [both use the Preload lists](http://blogs.windows.com/msedgedev/2015/06/09/http-strict-transport-security-comes-to-internet-explorer-11-on-windows-8-1-and-windows-7/). – StackzOfZtuff Oct 31 '15 at 14:22
-
@SteffenUllrich Worked for me just a couple of weeks ago, maybe I used was using a different tool or something. – voices Nov 01 '15 at 00:57
0
I'm pretty sure it's worked for me in the past. If I recall correctly; you may need to de-authenticate your victim and wait for them to re-connect. On account of EAP/EAPOL, I do believe.
voices
- 1,689
- 7
- 22
- 36