top | item 33508063

(no title)

Acinyx | 3 years ago

Any application that uses certificate pinning would fail in this situation as that's specifically what it is trying to prevent.

discuss

order

moviuro|3 years ago

You "just" need the key to the encrypted traffic. You don't have to change the handshake/negotiation, you just want a copy of the key so you can decrypt the traffic.

In TLS, the client authenticates server, then they both agree to use a key for the session; the OS can get a hold of this key (this is usually a bad move because then any captured traffic frames could be later decrypted).