Skip to content

MITM: SSL hijacking


SSL hijacking, also known as HTTPS hijacking or SSL stripping with forced HTTPS, is a type of cyberattack that targets SSL-encrypted connections between a user's browser and a website. The goal of this attack is to intercept and manipulate the encrypted communication between the user and the website, allowing an attacker to steal sensitive information or inject malicious content.

In an SSL hijacking attack, the attacker intercepts the user's HTTPS traffic and redirects it to a fake website that the attacker controls. The attacker then uses a fake SSL certificate to impersonate the legitimate website and establish an encrypted connection with the user's browser. The user's browser will display a padlock icon and a valid SSL certificate, making the user believe that they are connected to the legitimate website.

Once the encrypted connection is established, the attacker can steal sensitive information such as login credentials, credit card numbers, or other personal information, or inject malicious content such as malware or phishing pages.

SSL hijacking can be carried out in various ways, such as by exploiting vulnerabilities in the user's computer or network, by using social engineering techniques to trick the user into downloading and installing malware, or by using a compromised public Wi-Fi hotspot.


To protect against SSL hijacking, it is important to use strong and unique passwords, enable two-factor authentication, and use anti-malware software. Additionally, it is important to ensure that the website is using HTTPS by checking for the padlock icon in the browser address bar and verifying that the website's SSL certificate is valid.