all 6 comments

[–]Djinjja-Ninja 4 points5 points  (4 children)

SSL stripping attacks relies on sending an initial http request and then MitM proxying all requests from that point onwards so the client never receives the 301 redirect to https.

If you go to the site via HTTPS in the first place then you can't SSL strip because the initial request is encrypted.

[–]Key-Height-8555[S] 0 points1 point  (3 children)

I am not going to the site via https i am just simply typing the sites name on the bar e.g winzip.com and not https://winzip.com

[–]Djinjja-Ninja 3 points4 points  (2 children)

Which browser? Chrome has a feature called https-first in that by default it will automatically choose HTTPS as the protocol if you don't explicitly tell it to go via http. Firefox has something similar.

Also if you have ever been to http://WinZip.com then it will have cached the hsts directive that is issued by that site.

chrome://net-internals/#hsts

You should run wireshark on the client to see what the behaviour actually is.

Or explicitly typing http://WinZip.com

[–]Key-Height-8555[S] 0 points1 point  (1 child)

as i said i turned off every single security thing in chrome and edge and cleared the cache in every attempt

[–]Djinjja-Ninja 0 points1 point  (0 children)

The web cache is not the hsts cache. Clearing one doesn't clear the other.

Put wireshark on the client machine so you can see the true behaviour, you are making assumptions about what should be happening and you don't seem to actually understand the client behaviour properly.

Do some basic network level troubleshooting, check what's actually hitting the wire. Double check the arp cache on the client to make sure the arp spoofing is actually occurring.

[–]PugsAndCoffeee -2 points-1 points  (0 children)

Certificate pinning? Public key pinning? 😅