On Wed, Nov 24, 2004, MacDermid, Kenny wrote:

> > From: Charles B Cranston
> > 
> > MacDermid, Kenny wrote:
> > > I'm looking to locally reverse engineer a network protocol
> > > that's encrypted using ssl.
> > 
> > Another method would be to use a man-in-the-middle attack on 
> > a third machine, but that machine would need access to the 
> > private key of the certificate to be used.  Somewhere around 
> > I have a generic man-in-the-middle Unix program that I wrote 
> > to try to debug some early IMAP problems on the Handspring 
> > Visor, but it doesn't have any SSL.
> 
> I don't actually have access to the server, or the private key
> it is using. Also I'm guessing the client is smart enough to
> check the server certificate, so I'm guessing a generic
> man-in-the-middle is out.
> 
> 

I haven't followed this thread too closely. Does the client use OpenSSL? If
so you only need to replace the DLL with one that logs the data handled by
SSL_read() and SSL_write().

If CryptoAPI is used there are various ways to obtain the unencrypted premaster
secret and use that to decrypt the session.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to