I hope you find this article and its content helpful. You may want to check on my separate article on SSL/TLS decryption using Key files here. You can search the log file for the client random field, and cut and paste the key pairs into a stand alone file and send them to another machine to decrypt the traffic elsewhere. You can open the log file in a text editor.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |