![]() However, it doesn't explain how the private key file should be obtained or generated, so I went and looked around and found this blog entry: Īfter finding the appropriate packets as shown in the images, I exported the certificate, but unlike the challenge they were doing, the connection established for me uses RSA-2048 and does not provide the factorization (I'm assuming real certificates do not provide that, only the ones for games and such). I found out that Wireshark supports SSL decryption: However, the connection is secured and therefore I can't see the data in wireshark just like that. I would like to write a client to make the requests myself, but in order to do so I would need to first see the request payloads. ![]() ![]() I am working with a website that sends API requests. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |