This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Unable to decrypt the esp packets to extract SIP messages using esp_sa file saved in the location where the pcap file mycapture.pcap is present. esp_sa file contents: "IPv6","","","*","null","0X7B632E001C303C3C22CFADBF08D6D04F","HMAC-SHA-1-96","0XF7EDFD9700F446B1A6C9596070C6EA71" tshark command: tshark -nr mycapture.pcap -o esp.enable_encryption_decode:TRUE -o esp.enable_null_encryption_decode_heuristic:TRUE -o esp.enable_authentication_check:TRUE I'm looking for way where this can be automated with the keys in esp_sa file. Looking forward for some help. Thanks, Irina

asked 19 Aug '15, 12:08

arathika's gravatar image

arathika
6112
accept rate: 0%

I'am looking to decrypt esp packets using tshark by dynamically generating the file esp_sa. Is there a tshark command that can use the keys from esp_sa file and decrypt the esp packets with having to set this through edit->preference->esp>edit esp_sa's manually

(19 Aug '15, 12:44) arathika
Be the first one to answer this question!
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×109
×62
×20
×3

question asked: 19 Aug '15, 12:08

question was seen: 2,307 times

last updated: 19 Aug '15, 12:44

p​o​w​e​r​e​d by O​S​Q​A