1 | initial version |
I did a live HTTP/2 demo at annual FIRST conference in Edinburgh earlier this year. However, instead of sniffing with Wireshark I proxied the TLS traffic through PolarProxy and redirected the decrypted HTTP/2 pcap to Wireshark in real-time like this:
./PolarProxy -p 10443,80,443 --certhttp 10080 -w - | wireshark -k -i -
It worked out great! (phew, there were only a few hundred security experts in the audience...)
2 | No.2 Revision |
I did a live HTTP/2 demo at annual FIRST conference in Edinburgh earlier this year. However, instead of sniffing with Wireshark I proxied the TLS traffic through PolarProxy PolarProxy and redirected the decrypted HTTP/2 pcap to Wireshark in real-time like this:
./PolarProxy -p 10443,80,443 --certhttp 10080 -w - | wireshark -k -i -
It worked out great! (phew, there were only a few hundred security experts in the audience...)