A PowerShell-based tool for detecting potential SSL/TLS man-in-the-middle (MITM) attacks by monitoring certificate changes across various websites.
All credit to https://github.com/clr2of8/Detect-SSLmitm as this is a fork of that repo
- Download the ssl_mitm.ps1 script to your local machine and remote machine
- Set the appropriate PowerShell execution policy:
Set-ExecutionPolicy RemoteSigned -Scope CurrentUser - Dot source the script and initialize golden hashes:
> . .\ssl_mitm.ps1
> Update-GoldenHashes -UpdateScript
Run on both machines:
> Test-SSLMitm
The Output looks like this (compare output from local vs remote):
