writelock Posted November 9, 2009 Share Posted November 9, 2009 Hi. Hello my name is Fabrizio. I'm running an experiment with a server and a client that implements SSL and AES encryption. The server generates the text string and the client after the decoding. Unless all the traffic using tcpdump file try.cap. Later I ran the ramdump the RAM of the client. With the tool ". / Aeskeyfind trydump.bin" I found: eb2b1cf004e616a9da8eda3b636de5c1 1) How do I use the key to decrypt the file try.cap? 2) You can extract the SSL certificate from trydump.bin? Waiting for your news. Thanks Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.