Most firewalls and proxies that do something with URLs and/or content have SSL intercept capabilities.
Van: wireshark-users-bounces@xxxxxxxxxxxxx [mailto:wireshark-users-bounces@xxxxxxxxxxxxx]
Namens Noam Birnbaum
Verzonden: dinsdag 13 oktober 2015 01:33
Aan: Community support list for Wireshark <wireshark-users@xxxxxxxxxxxxx>
Onderwerp: Re: [Wireshark-users] dissecting HTTPS traffic
Curious, why wouldn't you recommend doing our own MITM attack? (And how would we do it?)
On Mon, Oct 12, 2015 at 11:22 AM, Mark Semkiw <Mark.Semkiw@xxxxxxxxxxxxx> wrote:
All you can really do at that point is analyze the endpoints and see if you can get any info from that. Well I guess you could setup your own man-in-the-middle
attack, but I wouldn’t suggest it.
Mark Semkiw, Senior Network Engineer
Met vriendelijke groet / With kind regards,
|