Re: [Wireshark-dev] Regenerating packet-parlay.c

2020-04-30 Thread Jaap Keuter
> On 1 May 2020, at 04:13, Luke Mewburn wrote: > > On 20-04-30 20:30, Jaap Keuter wrote: > | On 4/30/20 2:41 AM, Luke Mewburn wrote: > | > On 20-04-30 10:35, Luke Mewburn wrote: > | > | As to the problem; looking at the use of .keys() in wireshark_gen.py, > | > | there's a couple of plac

Re: [Wireshark-dev] Regenerating packet-parlay.c

2020-04-30 Thread Luke Mewburn
On 20-04-30 20:30, Jaap Keuter wrote: | On 4/30/20 2:41 AM, Luke Mewburn wrote: | > On 20-04-30 10:35, Luke Mewburn wrote: | > | As to the problem; looking at the use of .keys() in wireshark_gen.py, | > | there's a couple of places where the code is either: | > | - get_intlist(), so

Re: [Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-04-30 Thread Peter Wu
Hi George, On Thu, Apr 30, 2020 at 03:10:44PM +0300, webpentest wrote: [..] > Thanks for these additional resources! Just to clarify: extraction of > secrets from lsass.exe is absolutely possible; I was able to do that > successfully for on current windows 10. > > The problem here is the increasi

Re: [Wireshark-dev] Regenerating packet-parlay.c

2020-04-30 Thread Jaap Keuter
On 4/30/20 2:41 AM, Luke Mewburn wrote: > On 20-04-30 10:35, Luke Mewburn wrote: > | As to the problem; looking at the use of .keys() in wireshark_gen.py, > | there's a couple of places where the code is either: > | - get_intlist(), sorted: > | ret = list(ex_hash.keys()) > | ret.sort(

Re: [Wireshark-dev] Unable to cmake Wireshark on Red Hat 7 due to GLIB2 version error

2020-04-30 Thread João Valverde
Related: https://code.wireshark.org/review/#/c/36990/ On 30/04/20 12:10, Brodie, Mark (Refinitiv) wrote: Hi there, My wireshark build attempt fails during cmake when it checks the version of GLIB2. -- Checking for one of the modules 'glib-2.0' CMake Error at /opt/cmake-3.17.2-Linux-x86_64

Re: [Wireshark-dev] Unable to cmake Wireshark on Red Hat 7 due to GLIB2 version error

2020-04-30 Thread chuck c
Did you run the script to load the pre-reqs? https://nullsec.us/wireshark-from-source-rhel-7/ "Note below the rpm-setup.sh --install-optional step. This should install all the necessary prereqes." On Thu, Apr 30, 2020 at 10:19 AM Pascal Quantin wrote: > Hi Mark, > > Le jeu. 30 avr. 2020 à 17:1

Re: [Wireshark-dev] Unable to cmake Wireshark on Red Hat 7 due to GLIB2 version error

2020-04-30 Thread Pascal Quantin
Hi Mark, Le jeu. 30 avr. 2020 à 17:16, Brodie, Mark (Refinitiv) < mark.bro...@refinitiv.com> a écrit : > Hi there, > > > > My wireshark build attempt fails during cmake when it checks the version > of GLIB2. > > > > -- Checking for one of the modules 'glib-2.0' > > CMake Error at > /opt/cmake-3.1

[Wireshark-dev] Unable to cmake Wireshark on Red Hat 7 due to GLIB2 version error

2020-04-30 Thread Brodie, Mark (Refinitiv)
Hi there, My wireshark build attempt fails during cmake when it checks the version of GLIB2. -- Checking for one of the modules 'glib-2.0' CMake Error at /opt/cmake-3.17.2-Linux-x86_64/share/cmake-3.17/Modules/FindPackageHandleStandardArgs.cmake:164 (message): Could NOT find GLIB2: Found uns

Re: [Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-04-30 Thread webpentest
Hello Peter, thanks for your answer. I have truncated some of the quoting in order to avoid inflating the size of the message. On 30.04.2020 12:58, Peter Wu wrote: > This would be the ideal approach as access to the master secret provides > full functionality. Apart from the links shared before, I

Re: [Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-04-30 Thread Peter Wu
Hi George, On Thu, Apr 30, 2020 at 10:37:49AM +0300, webpentest wrote: > Hello list, > > I'm currently working on implementing a SSLKEYLOGFILE-like functions for > TLS connections that use Windows SChannel APIs (e.g. IE/Edge, as well as > other windows apps such as RDP client). SChannel does not

[Wireshark-dev] Support for TLS1.2 decryption using derived keys

2020-04-30 Thread webpentest
Hello list, I'm currently working on implementing a SSLKEYLOGFILE-like functions for TLS connections that use Windows SChannel APIs (e.g. IE/Edge, as well as other windows apps such as RDP client). SChannel does not expose its keys, though some research was done on recovering them (see [1] and [2]