https: Sniffing encrypted traffic locally
Some HTTP clients (including Chrome-based and libcurl based) respect the environment variable SSLKEYLOGFILE
to supply them with the path to write "pre-master" encryption secrets so other tools can decrypt the network traffic.
You can start a traffic sniffer, and configure it to decrypted HTTPS traffic:
Wireshark can be configured to read those secrets to decrypt traffic:
Edit -> Preferences -> Protocols -> TLS, and change the (Pre)-Master-Secret log filename preference to the path
tshark -o tls.keylog_file:"$SSLKEYLOGFILE"
Now you have a traffic sniffer watching, start an HTTP client and ask it to log keys it generates as part of its TLS operations:
export SSLKEYLOGFILE=~/sslkey.log
# Open browser with this environment
open -a "Brave browser"
# Or make request directly from this environment
curl https://blog.edwardsnjd.com/
Published on: 15 Aug 2024