8 More Discussions You Might Find Interesting
1. IP Networking
Hi all,
I have a script which permits users to access to a large list of IP ranges. Before, access to these ranges was granted by using a shell script to perform the necessary FORWARD chain command to allow traffic coming from the br0 interface and exiting the WAN interface, since br0 was... (0 Replies)
Discussion started by: haggismn
0 Replies
2. Ubuntu
Hi,
I receive a packet at input chain of iptables in filter table. How can i forward that same packet exactly to the output chain of the iptables in filter table. I need this help desperately. Thanks. (0 Replies)
Discussion started by: arsipk
0 Replies
3. Debian
Hello, the Nat and the forward worked on my debian server up to the reboot of machines.
The following rules*:
/sbin/iptables -t nat -A PREROUTING -p tcp -i eth2 -d xxx.xxx.xxx.xxx --dport 29070 -j DNAT --to-destination 10.0.1.7:29070
/sbin/iptables -A FORWARD -p tcp -i eth2 -o eth0 -d... (0 Replies)
Discussion started by: titoms
0 Replies
4. IP Networking
Hi all,
Now my need is:
This should forward each client to 1.11 and 1.12 as per each request.
I mean :
First request should go to : http://192.168.1.10:8080/MySite
Second request should go to : http://192.168.1.11:8081/MySite
Third request should go to ... (1 Reply)
Discussion started by: linuxadmin
1 Replies
5. IP Networking
Hello all, got kinda problem. Have two machines in LAN, one of them connected to Internet directly, another one must be forwarded through the first one. Masquerading works perfectly, but is not what is needed here. Both machines have public IP addresses, when the second machine is forwarded its... (0 Replies)
Discussion started by: Action
0 Replies
6. What is on Your Mind?
I can't wait for this movie to come out. I loved the first one and I look for a lot more action in the second one. Plus Scarlett Johannson as a red head.. I mean.. how can it be bad? :) (5 Replies)
Discussion started by: dday
5 Replies
7. UNIX for Advanced & Expert Users
Here is wat iam looking for , I need a forward script which sends out a mail to a particular server say (B-server) as soon as it receives a mail from differnt server say A-server.
Lets say abc@xyz.com is sending a mail from server A to Server B then the script should automatically send a mail to... (2 Replies)
Discussion started by: sriharan
2 Replies
8. UNIX for Dummies Questions & Answers
We have unix faxing software that e-mails the fax results to our users unix mail. We want to forward this e-mail to their desktop internet mail.
Originally we setup .forward files in each users id to eliminate unwanted unix mail from the fax. Now I want to modify the forward.
We are on... (3 Replies)
Discussion started by: MsGail
3 Replies
SSLSNIFF(1) General Commands Manual SSLSNIFF(1)
NAME
sslsniff - SSL/TLS man-in-the-middle attack tool
SYNOPSIS
sslsniff [options]
DESCRIPTION
This manual page documents briefly the sslsniff command.
sslsniff is designed to create man-in-the-middle (MITM) attacks for SSL/TLS connections, and dynamically generates certs for the domains
that are being accessed on the fly. The new certificates are constructed in a certificate chain that is signed by any certificate that is
provided.
sslsniff also supports other attacks like null-prefix or OCSP attacks to achieve silent interceptions of connections when possible.
OPTIONS
Modes:
-a Authority mode. Specify a certificate that will act as a CA.
-t Targeted mode. Specify a directory full of certificates to target.
Required options:
-c <file|directory>
File containing CA cert/key (authority mode) or directory containing a collection of certs/keys (targeted mode)
-s <port>
Port to listen on for SSL interception.
-w <file>
File to log to
Optional options:
-u <updateLocation>
Location of any Firefox XML update files.
-m <certificateChain>
Location of any intermediary certificates.
-h <port>
Port to listen on for HTTP interception (required for fingerprinting).
-f <ff,ie,safari,opera>
Only intercept requests from the specified browser(s).
-d Deny OCSP requests for our certificates.
-p Only log HTTP POSTs
-e <url>
Intercept Mozilla Addon Updates
-j <sha256>
The sha256sum value of the addon to inject
NOTES
sslsniff works only on the FORWARD traffic (not on INPUT or OUTPUT).
EXAMPLES
To intercept traffic on port 8443, start sslsniff on a local port:
sslsniff -a -c /usr/share/sslsniff/certs/wildcard -s 4433 -w /tmp/sslsniff.log
and redirect traffic to this port using the iptables nat table:
iptables -t nat -A PREROUTING -p tcp --destination-port 8443 -j REDIRECT --to-ports 4433
AUTHOR
sslsniff was written by Moxie Marlinspike.
This manual page was written by Pierre Chifflier <pollux@debian.org>, for the Debian project (and may be used by others).
August 16, 2009 SSLSNIFF(1)