Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]
Security

How Hackers Use SSL Strip to Obtain Secure Passwords [VIDEO]

Christian Crank
Christian Crank
3 Min Read
SHARE

Passwords are generally considered the first line of defense between cyber criminals and your data. In order to help prevent security breaches via logins, it’s crucial to pick strong passwords that are different for each of your important accounts, and it is good practice to update your passwords regularly. Despite these recommendations, people still employ weak passwords like “123456” and “password” – and then wonder why their data is stolen.

Passwords are generally considered the first line of defense between cyber criminals and your data. In order to help prevent security breaches via logins, it’s crucial to pick strong passwords that are different for each of your important accounts, and it is good practice to update your passwords regularly. Despite these recommendations, people still employ weak passwords like “123456” and “password” – and then wonder why their data is stolen.

As I’ve discussed here before, there are a number of ways hackers crack passwords. What I’ve also emphasized is that knowing the techniques hackers use is THE best way to combat them. In this short video, I will demonstrate how to use SSL Strip to obtain secure passwords. In addition to showing you how hackers carry out this attack, this video will guide you through the process so it can be applied to your company’s system to see if it’s accessible through weak passwords.

SSL Strip is a tool that essentially reroutes encrypted HTTPS requests from network users to plaintext HTTP requests, effectively checking out all logins traveling along the network via SSL. Basically, it lets users connect via HTTP, logs their information, then redirects their connection to the originally-intended HTTPS server on the Internet.

More Read

Daedalus, a cyber-attack alert visualization system (incredible video)
Cloud Security: Practical And Effective Ways To Protect Your Data
Security in the Cloud: How Are You Protecting Your Enterprise Data?
An Analysis of A NASA Dbase Hack-and-Dump
The Impact Of AI On Cybersecurity: Are Humans Still Your Best Asset?

Watch and learn how SSL Strip allows users to detect wimpy passwords on the network.

As you saw, using SSL Strip to lift passwords is fairly straight forward. All organizations are susceptible to this type of attack. Those companies with strong password policies are less at risk.

It’s important to make sure your Web security is up-to-date. Remember, SSL Strip looks for HTTPS traffic and then redirects it to HTTP traffic, this is what makes it vulnerable. If the website is all HTTPS and not HTTP, SSL Strip cannot change the HTTPS link to a HTTP link. On a site note, if you find yourself needing to use a public network, or if your personal WIFI is not secured, then it’s probably not a good idea to use that network to access any of your personal accounts, lest you become a target for an SSL Strip attack.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

mobile device farm
How Mobile Device Farms Strengthen Big Data Workflows
Big Data Exclusive
composable analytics
How Composable Analytics Unlocks Modular Agility for Data Teams
Analytics Big Data Exclusive
fintech startups
Why Fintech Start-Ups Struggle To Secure The Funding They Need
Infographic News
edge networks in manufacturing
Edge Infrastructure Strategies for Data-Driven Manufacturers
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

big data and AI in medical device cybersecurity
Big Data

Importance of Data-Driven Cybersecurity for Medical Device Companies

8 Min Read
Image
Big DataITPredictive AnalyticsSecurity

IIoT Benefits & Security Considerations for Sensor-2-Server

7 Min Read

Myths and Realities of Cloud Security

3 Min Read
Digital Identity
Data ManagementITPrivacySecurity

Data Security Tips: How Jay-Z & Kanye West Used Biometrics to Beat Album Leaks

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?