====== Ubuntu - SSL - Dump SSL data in realtime ======
ssldump -a -A -H -i en0
returns:
New TCP connection #1: sharewiz.net(32866) <-> 192.168.1.2(8389)
1 1 0.0043 (0.0043) C>S SSLv2 compatible client hello
1 2 0.0057 (0.0014) S>C Handshake
ServerHello
1 3 0.0057 (0.0000) S>C Handshake
Certificate
1 4 0.0057 (0.0000) S>C Handshake
ServerHelloDone
1 5 0.0182 (0.0125) C>S Handshake
ClientKeyExchange
1 6 0.0182 (0.0000) C>S ChangeCipherSpec
1 7 0.0182 (0.0000) C>S Handshake
1 8 0.0367 (0.0184) S>C ChangeCipherSpec
1 9 0.0367 (0.0000) S>C Handshake
1 10 3.2154 (3.1786) C>S application_data
1 11 3.2154 (0.0000) C>S application_data
1 12 3.4370 (0.2216) C>S application_data
1 13 3.4370 (0.0000) C>S application_data
1 14 3.4681 (0.0311) S>C application_data
1 15 3.4681 (0.0000) S>C application_data
2 3.4307 (3.4307) S>C TCP FIN
1 16 3.5172 (0.0491) S>C Alert
1 17 3.5178 (0.0006) C>S Alert
1 3.5180 (0.0001) C>S TCP FIN
2 3.4815 (0.0508) C>S TCP FIN
1 3.5194 (0.0013) S>C TCP FIN
**NOTE:**
* **-A** and **-H** options tell ssldump to print all of the SSL record layer headers.
* **-a**: Include TCP connection states, such as SYN, SYN/ACK, ACK, FIN, etc.
* **C>S**: Communications originating from the client.
* **S>C**: Messages originating from the server
----
===== Pass a Private Key to ssldump =====
To decrypt communications and dump application data, ssldump will need a copy of the private key from the server you wish to debug.
ssldump will use this key to derive the session key that is negotiated between the client and the server, and used to encrypt all network communications.
ssldump -a -A -H -k rsa.key -i en0
returns:
# connection setup removed...
3.6155 (3.6155) C>S
---------------------------------------------------------------
GET / HTTP/1.0
---------------------------------------------------------------
2 12 3.8862 (0.2310) C>SV3.1(32) application_data
2 13 3.8862 (0.0000) C>SV3.1(32) application_data
3.8466 (0.2311) C>S
---------------------------------------------------------------
---------------------------------------------------------------
3.8777 (0.0310) S>C
---------------------------------------------------------------
HTTP/1.1 403 Forbidden
Date: Mon, 12 Feb 2016 12:13:14 GMT
Server: Apache/2.0.50
Content-Length: 1
Connection: close
Content-Type: text/html; charset=iso-8859-1
**NOTE:** ssldump displays the HTTP requests sent to the sharewiz.net web server.
* ssldump supports Berkeley Packet Filter style filters, allowing you to grab and decode specific communications.
----
Capture SSL communications destined for host peter on TCP port 443:
ssldump -a -A -H -k rsa.key -i en0 host peter and port 443