sslsniff 0.8-4.2build1 source package in Ubuntu

Changelog

sslsniff (0.8-4.2build1) wily; urgency=medium

  * No-change rebuild against liblog4cpp5v5

 -- Steve Langasek <email address hidden>  Mon, 03 Aug 2015 01:44:02 +0000

Upload details

Uploaded by:
Steve Langasek on 2015-08-03
Uploaded to:
Wily
Original maintainer:
Ubuntu Developers
Architectures:
any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Xenial release on 2015-10-22 universe admin

Downloads

File Size SHA-256 Checksum
sslsniff_0.8.orig.tar.gz 203.0 KiB 50b4283a3e80fa4b4f3f684c4e76348aba8e257cbaa85e4f4cb7a4062cf091d5
sslsniff_0.8-4.2build1.debian.tar.xz 5.8 KiB ec9bce1d3bc1dfdd2a73227b5c9df2e3326a24f0e63c389b6da85991fc565b5e
sslsniff_0.8-4.2build1.dsc 1.9 KiB 4bb9cf9a7740f8d69fcfa6a3222c32a53aac44d4cfe2b576a56662283fb92c59

View changes file

Binary packages built by this source

sslsniff: SSL/TLS man-in-the-middle attack tool

 sslsniff is designed to create man-in-the-middle (MITM) attacks for
 SSL/TLS connections, and dynamically generates certs for the domains
 that are being accessed on the fly. The new certificates are constructed
 in a certificate chain that is signed by any certificate that is
 provided.
 sslsniff also supports other attacks like null-prefix or OCSP attacks to
 achieve silent interceptions of connections when possible.

sslsniff-dbgsym: debug symbols for package sslsniff

 sslsniff is designed to create man-in-the-middle (MITM) attacks for
 SSL/TLS connections, and dynamically generates certs for the domains
 that are being accessed on the fly. The new certificates are constructed
 in a certificate chain that is signed by any certificate that is
 provided.
 sslsniff also supports other attacks like null-prefix or OCSP attacks to
 achieve silent interceptions of connections when possible.