Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

hunting a spyware and decrypting traffic

Hello guys, how are you ? Oh, maybe I'm not here to ask you about that. Well I'm hunting a very advanced spyware that exfiltrate data maybe throught email or google talk. So I tried to decrypt the traffic exporting the SSLKEYLOGFILE variable to a file. Then I inserted the file in the wireshark TLS protocol option. But unfortunately only the 1% of the 443 traffic had been decrypted (HTTP2 protocol). Anyone can help me to understand what's happening ? Also, how do I troubleshoot why the packets haven't been decrypted ? Is there debug or log ? Also how I know which packets have not decrypted ? It's enough somehting like "tls and not http2" display filter ?

Thank u all.

hunting a spyware and decrypting traffic

Hello guys, how are you ? Oh, maybe I'm not here to ask you about that. Well I'm hunting hunting a very advanced spyware spyware that exfiltrate exfiltrate data maybe throught email email or google talk. google talk. So I tried to decrypt the traffic exporting the SSLKEYLOGFILE SSLKEYLOGFILE variable to a file. Then I inserted the file in the wireshark TLS protocol option. But unfortunately only the 1% of the 443 traffic had been decrypted (HTTP2 protocol).

Anyone can help me to understand what's happening ? ?

Also, how do I troubleshoot why the packets haven't been decrypted ? ?

Is there debug or log ? ?

Also how I know which packets have not decrypted ?

It's enough somehting like "tls "tls and not http2" http2" display filter ?

Thank u all.