Secure Sockets Layer/Transport Layer Security (SSL/TLS) is a protocol designed to improve the security of network traffic. A protocol using SSL — such as HTTPS — will include data encryption and integrity protections and authenticate the identity of the server. By default, most modern web browsing is performed using SSL-protected HTTPS. An SSL stripping attack is designed to force a user’s browser to connect to an unprotected version of the site without SSL encryption.
An SSL stripping attack is performed via a man-in-the-middle (MitM) attack. By inserting themself into the middle of the connection between a client and a webserver, an attacker can control the data that reaches the user. Once there, the user can filter the packets sent between the client and the server.
An SSL/TLS connection is built on top of a standard, unencrypted TCP connection. After a TCP connection is established, the client can either initiate the SSL/TLS session or move directly to requesting web content via unencrypted HTTP.
In an SSL stripping attack, the attacker intercepts all traffic between the client and the server and “strips” any SSL content from the client’s requests before passing them on to the server. As a result, the server will provide the unencrypted HTTP version of the page, which the attacker sends on to the client.
In the event that the server only provides an HTTPS webpage, the attacker can create two separate connections. They would maintain an HTTP connection with the client, serving the content that they requested. They could access this content by creating their own HTTPS connection to the server and accessing the same pages that the user requests.
In an SSL stripping attack, the main challenge for the attacker is to perform the man-in-the-middle attack needed for them to intercept traffic between the client and the server. There are a few ways that an attacker can accomplish this, including:
SSL stripping attacks eliminate the protection provided to web traffic by SSL/TLS. This can be used in various attacks that have negative impacts on the business, including:
SSL stripping attacks depend on the attacker’s ability to perform a MitM attack and move a user over to an unencrypted HTTP connection without them noticing. Some ways to protect against SSL stripping attacks include:
SSL stripping attacks provide a cybercriminal with the ability to perform a MitM attack, which can be used for eavesdropping or other malicious purposes. User education and the use of a VPN on untrusted networks can help to protect against these attacks.
SSL stripping attacks are not the only threat that a company and its users can face. To learn more about the current cyber threat landscape and the most significant threats to watch out for, check out Check Point’s 2023 Cyber Security Report.