How to DECRYPT HTTPS Traffic with Wireshark

preview_player
Показать описание
In this tutorial, we are going to capture the client-side session keys by setting an environment variable in Windows, then feed them to Wireshark for TLS 1.3 decryption.

Steps to capture client session key:
Open Control Panel:System
Select Advanced System Settings
Select Environment Variables
Add a new variable: SSLKEYLOG
Save to a location with a name ending in *.txt
Restart Chrome (You may have to reboot Windows in some cases)
Capture Traffic
Add the keylog file to the TLS Protocol in Wireshark Preferences.

CHAPTERS:
00:00 Introduction
00:35 #1. HTTPS Traffic
01:30 #2. Adding SSLKEYLOGFILE variable
03:20 #3. Configuring Wireshark
04:00 #4. Analyzing decrypted traffic

If you liked this video, I’d really appreciate you giving me a like and subscribing, it helps me a whole lot. Also don't be shy, chat it up in the comments!
Рекомендации по теме
Комментарии
Автор

Please keep producing useful content like this 🙏🏻

White-enp
Автор

Good video! Just a tip. Make the text a little bigger. Really hard to read even at 1440p

bobbyrandomguy
Автор

So, you're just decrypting your own data that you generated?

FrostDeDay