sslsniff 0.8-4.1 source package in Ubuntu
Changelog
sslsniff (0.8-4.1) unstable; urgency=low * Non-maintainer upload. * Drop rewriting boost suffixes (Closes: #709579) -- Dmitrijs Ledkovs <email address hidden> Mon, 12 Aug 2013 21:49:30 +0100
Upload details
- Uploaded by:
- Pierre Chifflier
- Uploaded to:
- Sid
- Original maintainer:
- Pierre Chifflier
- Architectures:
- any
- Section:
- admin
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
sslsniff_0.8-4.1.dsc | 1.8 KiB | 10d50feb9ab08c7e04578e3eb1f45c792fd35e254bce5f96a75f37bc2c9588b8 |
sslsniff_0.8.orig.tar.gz | 203.0 KiB | 50b4283a3e80fa4b4f3f684c4e76348aba8e257cbaa85e4f4cb7a4062cf091d5 |
sslsniff_0.8-4.1.debian.tar.gz | 5.5 KiB | 1c40a8f47677edc5ca689bc7271c7f69c92827e23a35e1616d37399e9cae0183 |
Available diffs
- diff from 0.8-4ubuntu1 (in Ubuntu) to 0.8-4.1 (787 bytes)
No changes file available.
Binary packages built by this source
- sslsniff: SSL/TLS man-in-the-middle attack tool
sslsniff is designed to create man-in-the-middle (MITM) attacks for
SSL/TLS connections, and dynamically generates certs for the domains
that are being accessed on the fly. The new certificates are constructed
in a certificate chain that is signed by any certificate that is
provided.
sslsniff also supports other attacks like null-prefix or OCSP attacks to
achieve silent interceptions of connections when possible.