IS IT IN WIRESHARK?

q-wert-Y
7 years ago

0

In wireshark , can we see the packets which contain password from SLL certified sites ?

6replies
4voices
253views
Smyler [WHGhost]
7 years ago

0

No, that’s the goal of SSL/TLS. It encrypts your requests so that only the browser and server can understand them.

dloser
7 years ago

0

That is, unless you have right key to decrypt it. (Or there is some weakness.)

Smyler [WHGhost]
7 years ago

0

Does that mean you found a 0-day in TLS? :o
There may be some, KRAK showed us that researchers can still find vulnerabilities in widely used protocols, but that’s not something anyone would use.

dloser
7 years ago

0

“unless X” does not imply “X”.

SIGKILL [r4v463]
7 years ago | edited 6 years ago

2

Just to note that SSLv1 was so broken it has never been released, SSLv2 has been released in 1995 and deprecated in 1996 because it was broken, SSLv3 is broken too and we’ve moved to TLS. TLS 1.0 is now considered as vulnerable. We have now TLS 1.2 which we can rely on (and TLS 1.3 on draft). So it depends which version of which protocol is used by the SSL/TLS certificate.

In addition to that, there are some attacks that an attacker can perform to “disable” SSL/TLS or downgrade the version used (I let you take a look at HSTS and downgrade attack if it interests you). So the attacks against encrypted channels don’t have to be cryptographic attacks.

q-wert-Y
7 years ago | edited 7 years ago

0

Thanks for your help! :)

Discussion thread has been locked. You can no longer add new posts.
1 of 7

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.

Dismiss