Hi. Hello my name is Fabrizio. I'm running an experiment with a server and a client that implements SSL and AES encryption. The server generates the text string and the client after the decoding. Unless all the traffic using tcpdump file try.cap. Later I ran the ramdump the RAM of the client. With the tool ". / Aeskeyfind trydump.bin"
I found:
eb2b1cf004e616a9da8eda3b636de5c1
1) How do I use the key to decrypt the file try.cap?
2) You can extract the SSL certificate from trydump.bin?
Waiting for your news. Thanks