Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

sslsniff(1) [debian man page]

SSLSNIFF(1)						      General Commands Manual						       SSLSNIFF(1)

sslsniff - SSL/TLS man-in-the-middle attack tool SYNOPSIS
sslsniff [options] DESCRIPTION
This manual page documents briefly the sslsniff command. sslsniff is designed to create man-in-the-middle (MITM) attacks for SSL/TLS connections, and dynamically generates certs for the domains that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that is provided. sslsniff also supports other attacks like null-prefix or OCSP attacks to achieve silent interceptions of connections when possible. OPTIONS
Modes: -a Authority mode. Specify a certificate that will act as a CA. -t Targeted mode. Specify a directory full of certificates to target. Required options: -c <file|directory> File containing CA cert/key (authority mode) or directory containing a collection of certs/keys (targeted mode) -s <port> Port to listen on for SSL interception. -w <file> File to log to Optional options: -u <updateLocation> Location of any Firefox XML update files. -m <certificateChain> Location of any intermediary certificates. -h <port> Port to listen on for HTTP interception (required for fingerprinting). -f <ff,ie,safari,opera> Only intercept requests from the specified browser(s). -d Deny OCSP requests for our certificates. -p Only log HTTP POSTs -e <url> Intercept Mozilla Addon Updates -j <sha256> The sha256sum value of the addon to inject NOTES
sslsniff works only on the FORWARD traffic (not on INPUT or OUTPUT). EXAMPLES
To intercept traffic on port 8443, start sslsniff on a local port: sslsniff -a -c /usr/share/sslsniff/certs/wildcard -s 4433 -w /tmp/sslsniff.log and redirect traffic to this port using the iptables nat table: iptables -t nat -A PREROUTING -p tcp --destination-port 8443 -j REDIRECT --to-ports 4433 AUTHOR
sslsniff was written by Moxie Marlinspike. This manual page was written by Pierre Chifflier <>, for the Debian project (and may be used by others). August 16, 2009 SSLSNIFF(1)

Check Out this Related Man Page

Mono(httpcfg)															     Mono(httpcfg)

httpcfg - Mono Certificate Management for HttpListener SYNOPSIS
httpcfg [options] certificate DESCRIPTION
This tool is used to manage the certificates used by the HttpListener embeddable server class when the HttpListener is configured as an HTTPS server instead of an HTTP server. You must select one of the possible actions: add, delete or list. When adding a certificate (-add), you must provide the following information: a certificate (with the -cert flag) a Private Key file (with the -pvk argument, the filename is typically "key") and a port number (with the -port flag). When deleting a certificate (-del or -delete) you need to provide the port number. PARAMETERS
-add Adds a new certificate/private key combination for being used at a given port by the HttpListener API. -del, -delete Deletes the certificates associated for the port specified (must be specified separatedly). -list List all known certificates. -port PORT Specifies the port to add certificates to, or remove certificates from. -pvk FILE Specifies the Private Key file. -cert CERT Specifies the certificate file to use. EXAMPLES
httpcfg -add -port 8081 -pvk myfile.pvk -cert MyCert For more details on creating the certificate file and the private key, see the following web page: FILES
The certificates are stored in the ~/.mono/httplistener directory AUTHOR
httpcfg was written by Gonzalo Paniagua. COPYRIGHT
Copyright (C) 2006 Novell. MAILING LISTS
Visit for details. WEB SITE
Visit for details SEE ALSO
makecert(1), signcode(1), cert2spc(1) The private key format: Mono(httpcfg)
Man Page

Featured Tech Videos