LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 10-10-2005, 07:58 PM   #1
wwnexc
Member
 
Registered: Sep 2005
Location: California
Distribution: Slackware & Debian
Posts: 264

Rep: Reputation: 30
Lightbulb ethereal & https


Hi,

I am capturing traffic using ethereal, and i am trying to decrypt the https data.

If you think it can't be done, think again: I was able to do it under M$ Windoze with "cain and abel". It shows all the passwords send over https.

Any ideas will help!!

Thanks

PS: I am not using it for anything illegal!! I am trying to see what others could do to my network. Please don't spam this post saying: "We won't tell you how to do this, it's illegal, noob!"
 
Old 10-11-2005, 05:41 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Please redirect comments to the same thread here.
 
Old 10-11-2005, 06:18 AM   #3
ncorreia
Member
 
Registered: Apr 2003
Distribution: Red Hat
Posts: 37

Rep: Reputation: 15
Hi,

I'm not familiar with the tool you mentioned nor the conditions under which you performed that test. Even though I'm not exactly a "guessing" fan, I'd say that that tool somehow gets hold of the master key sometime during the SSL handshake. Since that master key is defined by the client, and (I'm gessing here...) the tool is running on the client, it could make that possible.
I'd like to see (I'll try it as soon as can) that tool working in a 3rd machine sniffing traffic from/to the client (maybe on a proxy or something). I don't really believe in a brute force attack against the cipher strengths involved in the process (although I could be wrong). The master key is passed to the server encrypted with the server's public key (only way to see this is having the server's private key) and from then on the symmetric master key is used. Of course there's a zillion scenarios I could imagine that would make it possible to perform that ( I could have gotten hold of the server's private key somehow, some replay attacks, etc.) but not through a tool in so little time...


With this redirection thing I didn't see it was already answered...

Cheers

Last edited by ncorreia; 10-11-2005 at 06:19 AM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Apache Https & Proxy wwnexc Linux - Software 0 11-04-2005 04:01 PM
ethereal & https wwnexc Linux - Security 2 10-11-2005 05:48 AM
trouble with apache 1.3 & https & debian deuce868 Linux - Networking 0 11-20-2004 08:11 PM
Nat & Https poubelle2003200 Linux - Networking 6 03-27-2004 06:02 PM
https & virtual host v2lk Linux - Networking 2 10-07-2003 12:43 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 02:33 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration