I want to decrypt a few packets that a program on my computer is sending/receiving. Now, how can I set up Wireshark to use this key to decrypt incoming Blowfish packets? asked 06 May '14, 07:51 sookx showing 5 of 6 show 1 more comments |
One Answer:
well, if it's a custom binary protocol, you won't be able to do anything unless you know the protocol. I don't mean UDP, I mean the way the data is encoded in the UDP frame.
No, you can't, because without any knowledge about the parameters for encryption, you can't decrypt the data. What you need is:
Without that information, there is no way to decrypt the data, other than a brute force of all possible combinations, which is a totally pointless operation unless you are working for the NSA ;-). So, if you want to decrypt those frames, you will need (at least):
Regards answered 09 May '14, 08:51 Kurt Knochner ♦ edited 09 May '14, 11:56 |
What is the protocol used to send the packets?
Are you using a 128-bit key?
http://wiki.wireshark.org/ESP_Preferences
@Kurt Knochner It uses UDP.
@DDay Yes, it uses a 128-bit key.
If you have UDP packets with encrypted user data you would have to write your own dissector registering for an UDP port and do the decryption there.
Well, yes. Thanks.
But what I meant is this: what encryption protocol (or scheme) is being used, like HTTPS, IPSEC, OpenVPN, etc.
You can't just decrypt UDP without knowing the protocol being used, especially if you want Wireshark to do the decryption.
@Kurt Knochner As far as I know it uses a custom binary protocol and every packet is encrypted with Blowfish. SO I guess that you could basically just run the decryption algorithm on the contents of a packet.