@Hubert I might as well link my question to this since i’m having the same doubts. I have used sslstrip, and the other tools when MITM, but unless you got a really good signal going, the other person can easily detect something is up as the webpages will show up as insecure and user needs to accept them since you strip HTTPS from initial webpages.
My question for @HackerSploit is can you demo how to decrypt 802.11 wifi packets where you can actually see the websites and possibly credentials of HTTPS traffic under TCP protocol. I’ve seen a lot of videos claiming to do this but its intrusive. How can this be done passively without detection of remote user. Sure we can use wireshark and put in the PSK key for a network but it doesn’t show much. When looking at the decryption tab, nothing of any use since its still somewhat binary. How to get private key via a capture and then use it would be ultimate hack and “ghost” hacker. And no Pfishing or MITM or Social Engineering…yes they all can work but its a waiting game to see if user is stupid enough to click on a link these days where they know its potentially not real.