Z
Z
Zvenem2019-12-26 20:57:26
Computer networks
Zvenem, 2019-12-26 20:57:26

Is it possible to intercept tcp tls traffic in unencrypted form directly from the device?

Actually, the question is in the header. Reverse proxy like burp suite proxy or mitmproxy.
If this is at all possible, then advise the utility, please.

Answer the question

In order to leave comments, you need to log in

3 answer(s)
V
Vamp, 2019-12-26
@Zvenem

Interception is impossible, since traffic is encrypted at the application level, not the OS. Your only way to intercept is mitm. But if the application uses certificate/public key pinning, then mitm won't help you either.

V
Valentin, 2019-12-26
@vvpoloskin

I probably won’t reveal the secret, but in the modern world tls goes only on the balancer-application section. But from the balancer to the application server itself, everything is open, and even mirrored several times to analyzers, pass dpi, etc. The same freedom is created in the user device itself when moving information from user actions to the tcp / ip stack.

I
iddqda, 2019-12-27
@iddqda

Well, it depends on which application this TLS organizes and supports such mitm and no,
for example, Firefox and Chrome put the session key in the file specified in the SSLKEYLOFILE environment variable
And wireshark can work with this key

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question