Answer the question
In order to leave comments, you need to log in
Is it possible to intercept tcp tls traffic in unencrypted form directly from the device?
Actually, the question is in the header. Reverse proxy like burp suite proxy or mitmproxy.
If this is at all possible, then advise the utility, please.
Answer the question
In order to leave comments, you need to log in
Interception is impossible, since traffic is encrypted at the application level, not the OS. Your only way to intercept is mitm. But if the application uses certificate/public key pinning, then mitm won't help you either.
I probably won’t reveal the secret, but in the modern world tls goes only on the balancer-application section. But from the balancer to the application server itself, everything is open, and even mirrored several times to analyzers, pass dpi, etc. The same freedom is created in the user device itself when moving information from user actions to the tcp / ip stack.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question