Wednesday, April 21, 2010

Tor Exit Node + sslstrip

Site of the day:

sslstrip, hijacking SSL in network

posted Feb 23rd 2009 7:25pm by Eliot Phillips

Last week at Black Hat DC, [Moxie Marlinspike] presented a novel way to hijack SSL. You can read about it in this Forbes article, but we highly recommend you watch the video. sslstrip can rewrite all https links as http, but it goes far beyond that. Using unicode characters that look similar to / and ? it can construct URLs with a valid certificate and then redirect the user to the original site after stealing their credentials. The attack can be very difficult for even above average users to notice. This attack requires access to the client’s network, but [Moxie] successfully ran it on a Tor exit node.

This is a hacker’s hack – a really cool proof of concept. But in the real world, someone would have to hack your bank, your ISP or your home network. If they root the bank (e.g. Heartland) why bother with SSL traffic, just get the raw data. If they get your PC, they can grab keystrokes regardless of how good the network security is. And let’s face it, there are a lot of people who can be fooled by a site that just looks the same, never mind the URL or certificate. Although, just maybe, a wireless hotspot at a hotel or cafe might be a candidate for sslstrip. I think it would be hard – diverting traffic through a PC instead of going straight to a switch – but it’s probably easier than hacking an ISP or bank.

The paper is worth a read:
.. hey, maybe combine it with the BGP attack: (that was amazing – stole all the DEFCON traffic for an hour or so..)


Tool to check for bad nodes:


Read also:


  1. Thanks for sharing, this is a fantastic post.Really looking forward to read more.

  2. I like this post. I visited your blog for the first time and just been your fan. Keep posting as I am gonna come to read. Thanks for sharing. keep it up.