Great to hear you have it working
Originally Posted by dfzquery
Thanks for the thanks, good to hear its working for you.
Originally Posted by jFcOOd
Can you verify that you are connected? Can you ping another host on the network? Are you going from wireless to wired? Log in to the router, and have a look at the security settings.
Originally Posted by trixify
Yes, you can use ettercap to do the MITM rather than using arpspoof like in the video.
Originally Posted by PHPMyEttercap
It sounds like the issue is that on your target computer, as you have already allow the fake certificate! Hence why it HTTPS. (You have allowed the fake certificate to the expectation list?)
The idea behind SSLStrip is that the target doesn't have to accept the fake certificate, as it removes the certificate all together.
Try using another client or removing the certificate from the expectation, or use a different browser - see if it is still working for you.
This guide doesn't install a fake certificate...
And yes. If you have added it to accept a fake certificate, I'm sure you would be vulnerable. It’s best to remove it ASAP.
Originally Posted by PeopleInPower
This enables IP forwarding. This is needed to forward IP packets from one source to another. e.g. From the target to the router! Otherwise they will not have internet access.
echo 1 >/proc/sys/net/ipv4/ip_forward
The file is either 0 or 1, which disables or enables ip_forwarding and its just a text file
I’m not sure what you mean by
Thank you for your results regarding which sites you tried and browsers used. Always good to know.
Where should my step in security exploits be, any recommendations?