Skip to content

centos sslsplit traffic interception (simplified)

Unwrap SSL http(s) communications using sslsplit and hosts file; for development / niche purposes only.

Assumption / Optimizations:

  • Full access to client (target) OS
  • Dedicated CentOS 6 MitM VM
  • Single target ip/domain/port you want to sniff traffic on
  • Hosts file based interception

Fresh MitM VM

Client OS

 Test and Intercept

  1. Execute the action on the client OS / visit the site you want to intercept.
  2. Check the output of sslsplit visible on the command line.
  3. See the decrypted conversation in files at /tmp/sslsplit/logs/

Other more comprehensive / complex / multi-platform / alternate method tutorials exist elsewhere.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *