This topic contains 1 reply, has 2 voices, and was last updated by kong-dao 1 month, 1 week ago.
- July 7, 2020 at 8:24 pm #279711
Hey all i have a small question
Does downgrading from https to http and dns-spoofing actually works if the target already have visited the website you’re targetting before the attack was started or not? I have tried to to search this up but i didn’t really find an answer.
- July 7, 2020 at 8:24 pm #279712
Im not an expert, so take it as a suggestion, but maybe you can do it with sslstrip, that will remove tags from httpS, but user is going to receive a warning about certificates, usually users are dumb and accept…
- July 7, 2020 at 8:24 pm #279713
It depends on if the site sets the [HSTS header](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security). If that is set, and the victim has visited the site, the browser will refuse to downgrade to HTTP. If the site is on the browser pre-load list, it won’t matter if the victim has visited the site before.
- July 7, 2020 at 8:24 pm #279714
I am not an expert so anyone feel free to correct me
As others are saying u to use SSLScript to downgrade https so let me clear that we can downgrade HTTPS websites with SSLScript only if the victim is using an outdated and vulnerable browser. Modern browsers are secure
U need to do DNS cache poisoning if the victim has already visited the website for doing this u will need access to his computer through a payload but this attack methodology is a headache u can use a post exploit of metasploit called netripper to intercept network traffic and encryption related functions from a low privileged user, being able to capture both plain-text traffic and encrypted traffic before encryption/after decryption.
I don’t know that it still works or not
You must be logged in to reply to this topic.