![]() This should filter all the packets in the main window, limiting them to the TCP stream of interest. Right click on one of the packets and select "Follow > SSL Stream". ![]() Some of those packets should be highlighted in green with a protocol of "HTTP" if it was successfully decrypted. To get the response time, find a packet from the request/response conversation. There is a more detailed walk through at: Then in Wireshark, open Preferences > Protocols > SSL and point the Pre-Master-Secret log at the same file. As an example, to configure Chrome, you set the environment variable SSLKEYLOGFILE to the full path of the log file and restart any Chrome processes (including background processes). ![]() One easy way to decrypt SSL traffic is to configure your browser to save pre-master secrets to a log file and configuring Wireshark to look for secrets in that log file. Configure Wireshark to decrypt SSL, and then measure the response time as with HTTP (i.e., by subtracting the packet times).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |