Working exploit code for the POODLE attack on SSLv3
# sudo apt install python3 python3-pip build-essential python3-dev libnetfilter-queue-dev dsniff jq
# pip3 install NetfilterQueue scapy reprint
Only tested on Ubuntu 16.04, may not work on other distributions or versions.
Add proper values to config.json
# sudo ./start_mitm
The Man in the Middle (MitM) attack is conducted using ARP spoofing on a LAN, assuming that the attacker is on the same local area network as the target (client) computer. The router is tricked into sending packets destined for the client to the attacker, and the client is tricked into sending packets destined for the router to the attacker. The attacker, which is running start_mitm
, will forward these packets to their correct destinations, so that the client and server are none the wiser. This is done automatically if the values are set correctly in config.json
.
Coming soon...