SSLKILL – Forced Man In The Middle Attack – Sniff HTTPS/HTTP

Posted by


SSL Kill is a forced man-in-the-middle transparent proxy that modifies HTTP requests and responses in order to avoid SSL and HSTS, to achieve that, it uses a two-way ARP spoofing plus a forced DNS resolver that redirects all name server queries to the attacker IP Address.

This tool is only for information security researchers and should not be used for criminal acts.

The latest version of SSL Kill is v1.2

Installation and Usage of SSL KILL –

You can easily download the sslkill package from Github repository but before to install sslkill, we need to install some dependencies which are build-essential, python-dev and libnetfilter-queue-dev

To install these dependencies, just type

Command: apt-get install build-essential python-dev libnetfilter-queue-dev

Now we need to install sslkill package, which we can easily download it from Github via git clone command.

Command: git clone

Now install all further dependencies which you can easily found in requirements.txt file and to install these dependencies just type “pip install -r requirements.txt” in your terminal.

Change the permissions of file with the help of chmod command and then execute “./” in same terminal.

Command: chmod +x

Now run “./ -i eth0 -t <Target IP> -g <Gateway IP>

Here you can see, -i stands for eth0, -t stands for Target host, and -g stands for gateway address which you can easily find by typing the command “route -n“.

Now when your target/victim opens any website based on HTTPS, all the requests will automatically be spoofed and sniffed as shown below:

Feel free to leave a comment below or reach me on Instagram @iamshubhamkumar__.


Posted by Shubham ;)

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.