On Oct 1, 2024, at 8:38 AM, Kaushal Shriyan <kaushalshri...@gmail.com> wrote:

> Thanks, Michael, for the quick response. Is there a way to capture and
> analyze *HTTPS* traffic since the data is encrypted?

Maybe, *if* you can get the necessary information; see

        https://wiki.wireshark.org/TLS#tls-decryption

As it notes:

        "The key log file is generally recommended since it works in all cases, 
*but requires the continuous ability to export the secrets from either the 
client or server application*." - emphasis mine; that's what Michael was 
referring to when he said

                You'll have to modify the application.
                Some TLS libraries have options to dump things.

Otherwise, as Michael noted, no - the "S" in "TLS" stands for "security" (and 
the first "S" in "SSL" stands for "secure"), and that's "security" as in 
"preventing people from capturing your traffic and reading it".
_______________________________________________
tcpdump-workers mailing list -- tcpdump-workers@lists.tcpdump.org
To unsubscribe send an email to tcpdump-workers-le...@lists.tcpdump.org
%(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s

Reply via email to