Skip to content

Script to silently intercept SSL on computers infected with Superfish malware

License

Notifications You must be signed in to change notification settings

0xPoly/Superphish

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Superphish

Peter Hortensius, Lenovo CTO, in an interview with Wall Street Journal:

"We’re not trying to get into an argument with the security guys. They’re dealing with theoretical concerns."

This script will silently intercept SSL connections made from computers infected with Superfish malware on the local network. All traffic will be logged into 'superphish.log'. Works in three stages:

  • Activates packet forwarding
  • ARP poisoning
  • SSL interception with Superfish CA keys

To target all clients on network:

./superphish.sh interface gateway-ip

Specific target:

./superphish.sh interface gateway-ip target-ip

Needed dependecies will be installed automatically at first run.

Thanks to:

About

Script to silently intercept SSL on computers infected with Superfish malware

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages