sslsniff 0.8-4.2build1 source package in Ubuntu
Changelog
sslsniff (0.8-4.2build1) wily; urgency=medium * No-change rebuild against liblog4cpp5v5 -- Steve Langasek <email address hidden> Mon, 03 Aug 2015 01:44:02 +0000
Upload details
- Uploaded by:
- Steve Langasek
- Uploaded to:
- Wily
- Original maintainer:
- Ubuntu Developers
- Architectures:
- any
- Section:
- admin
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Xenial | release | universe | admin |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
sslsniff_0.8.orig.tar.gz | 203.0 KiB | 50b4283a3e80fa4b4f3f684c4e76348aba8e257cbaa85e4f4cb7a4062cf091d5 |
sslsniff_0.8-4.2build1.debian.tar.xz | 5.8 KiB | ec9bce1d3bc1dfdd2a73227b5c9df2e3326a24f0e63c389b6da85991fc565b5e |
sslsniff_0.8-4.2build1.dsc | 1.9 KiB | 4bb9cf9a7740f8d69fcfa6a3222c32a53aac44d4cfe2b576a56662283fb92c59 |
Available diffs
- diff from 0.8-4.2 (in Debian) to 0.8-4.2build1 (494 bytes)
Binary packages built by this source
- sslsniff: No summary available for sslsniff in ubuntu wily.
No description available for sslsniff in ubuntu wily.
- sslsniff-dbgsym: debug symbols for package sslsniff
sslsniff is designed to create man-in-the-middle (MITM) attacks for
SSL/TLS connections, and dynamically generates certs for the domains
that are being accessed on the fly. The new certificates are constructed
in a certificate chain that is signed by any certificate that is
provided.
sslsniff also supports other attacks like null-prefix or OCSP attacks to
achieve silent interceptions of connections when possible.