[Oisf-users] OT: Sending unencrypted traffic with sslsplit to suricata

Cooper F. Nelson cnelson at ucsd.edu
Mon May 11 18:20:55 UTC 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

There's your answer.  Run sslsplit and suricata on your gateway router.

- -Coop

On 5/11/2015 1:14 AM, C.L. Martinez wrote:
> To actually implement an attack, you also need to redirect the traffic
> to the system running sslsplit.  Your options include running sslsplit
> on a legitimate router,


- -- 
Cooper Nelson
Network Security Analyst
UCSD ACT Security Team
cnelson at ucsd.edu x41042
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJVUPMHAAoJEKIFRYQsa8FW5hEIAJ/iMsVvDA445cDUB9dPDAAS
Yye6bbbkcPYC1WWhkDPxN2zecBzenmlV2WsqSCR0Q3/HhxNa7/OsV6yj6Z3K+zVd
yxPvE+trY1xkJ9mcf7/aMzSBLNt8HgK5Z59/C1JF8GaDyHeYwjJB+r/lSNGu/Y4j
W9VoWrzFrouX7UMJmhI7TocuXYGAmZqVyNb6kQvBfzbBYcXQ1W6Z08ycLgE3teCM
7wmBzSuYVgDUmQDifxPppXnlks+hZVztsPVqpM5qCZbSolB1E5f0emjbpUax49QW
NZldro3eYqkAOEtLzE8+VWAKNtXQ3RdoeQa5RqEsMZ6U/mFAo4BzBh/0/VkGou4=
=X2R1
-----END PGP SIGNATURE-----



More information about the Oisf-users mailing list