Hello, Been bashing my brain trying to find a solution to decrypting ssl traffic using tshark when I only have access to one side of the conversation. The traffic I see is asymmetric so I will never see the response from the ssl handshake leaving my network as it leaves out of another network pipe. Would it be possible to sniff the traffic having the private/pub keys or would I require full visibility into the TCP session? Thank you. asked 27 Feb '12, 23:49 divious1 |
One Answer:
AFAIK that is not possible. You need information from both sides of the conversation to be able to decrypt the traffic. The things that pop into mind are:
answered 04 Mar '12, 03:27 SYN-bit ♦♦ |