Updates SSLsplit v-0.4.9 : Transparent and scalable SSL/TLS interception.

Changelog SSLsplit 0.4.9 2014-11-03 :
– Filter out HSTS response header to allow users to accept untrusted certs.
– Build without SSLv2 support by default (issue #26).
– Add primary group override (-m) when dropping privileges to an unprivileged user (pull req #35 by @landonf).
– Support pf on Mac OS X 10.10 Yosemite and fix segmentation fault if no NAT engine is available (pull req #32 by @landonf).
– Support DESTDIR and MANDIR in the build (pull req #34 by @swills).
– No longer chroot() to /var/empty by default if run by root, in order to prevent breaking -S and sni proxyspecs (issue #21).
– Load -t certificates before dropping privileges (issues #19 and #20).
– Fix segmentation fault when using -t without a CA.
– Minor bugfixes and improvements.

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.

Usage : Usage-SSLsplit
Download latest version : sslsplit-0.4.9.tar.bz2 (229,49 KB)
Source : http://www.roe.ch/SSLsplit
Our Post Before : http://seclist.us/transparent-and-scalable-ssltls-interception-sslsplit-v-0-4-5-released.html