Let me try to explain what I would like to do with an example. I start a live capturing traffic over eth0 and what I would like to see is the host name for every HTTP request performed over TLS:
Now I open Chromium in private mode and enter facebook.com - this is what gets captured:
But if I do a full refresh with [Ctrl]+[F5] nothing is added to that list. As I understand this is b/c what I capture is the host information communicated during the handshake which is not reperformed for a request to an already established TLS connection. So my question would be - what would I have to filter for to basically get the host name for every single request over TLS? I suspect this is not possible to be done by filtering b/c that information is not relayed for every request - but maybe there is an equivalent solution? asked 25 Feb '16, 02:20 Raffael1984 edited 25 Feb '16, 02:23 |
One Answer:
Unless the The http requests sent using an already established TLS-encrypted TCP session do contain the target url, but by the very principle of TLS:
Therefore:
With decryption working properly, you can use answered 25 Feb '16, 03:27 sindy |