This trophy shows you some cool things that you can do.
- load the
tls
layer withload_layer()
- use
sniff
to capture some HTTPS traffic (i.e. 443/tcp) - filter packets that have a
TLS
object - identify a ClientHello or a ServerHello message
- display the ciphersuites
- use
tcpdump
to sniff all packets on 443/TCP sent togrehack.fr
and write them togrehack.fr.pcap
- use
curl
to connect tohttps://grehack.fr
and use theSSLKEYLOGFILE
environment variable to dump session keys togrehack.fr.keys.log
- use
editcap
to merge the two filesgrehack.fr.keys.log
andgrehack.fr.pcap
intogrehack.fr.pcapng
- import the PCAPng file in Scapy using
rdpcap()
and look for unencrypted strings!
- use
sniff()
to sniff all packets on 443/TCP sent towww.perdu.com
,www.scapy.net
, and write them totest_sessions.pcapng
- display the content of the PCAPng using the
sniff()
parametersoffline
andprn
- add the
session=TLSSession
and display it content again, can you spot any useful differences?
- the TAB key can be used to find Scapy layers names!
- check the help message of the
editcap
--inject-keys
parameter