如何从linux下的命令行转储和解密HTTPS流量? [英] How can I dump and decrypt HTTPS traffic from the command line under linux?
本文介绍了如何从linux下的命令行转储和解密HTTPS流量?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!
问题描述
我有一个我需要调试的Web应用程序,因为我怀疑请求发送在去往服务器的路上被改变了。
I have a web application that I need to debug because I suspect that the request send is altered on its way to the server.
我想转储HTTPS在端口localhost:443上收到的流量并解密它以便我可以检查包。
I want to dump the HTTPS traffic received on port localhost:443 and decrypt it so I can check the packages.
显然我确实从服务器私下嘿。
Obviously I do have the private hey from the server.
有没有办法从命令行?
推荐答案
你可以使用 ssldump 。(它在libpcap之上工作)。
You can use ssldump.(it works on top of libpcap).
ssldump -r <File_Name>.pcap -k <Key_File>.key -d host <IP_Address>
使用 ssldump
指定以下选项实用程序:
You specify the following options with the ssldump
utility:
-r: Read data from the <File_Name>.pcap file instead of from the network.
-k: Use <Key_File>.key file as the location for the SSL keyfile.
-d: Display the application data traffic.
您可以参考完整示例这里
这篇关于如何从linux下的命令行转储和解密HTTPS流量?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!
查看全文