Why https packet capture to see the plaintext?

https principle of packet capture

Many tools can capture, I use Charles for Mac can capture.

Grab the phone https package process
mac To install the certificate and set to new, first mobile phone set to the LAN MAC and the same, set the proxy IP and port 443, and then the phone to download and install the certificate, and trust settings. After Charles will be able to catch up on the phone network requests.

Packet capture tool forged since signed certificate can successfully get caught, and caught a plaintext.

Encryption layer between the layer located at http, tcp layer (transport layer) (application layer), the data layer http caught and not encrypted. Similarly, in the background the receiving end, the decrypted After arriving at the data layer is http plaintext. To note, https instead of http encrypt packets, but the business data is encrypted, and then use the http transport. So it is necessary to perform MD5 encrypted password for the job on the client side.

The principle is to capture https packet capture program interception returned by the server certificate, and then a return to the client with its own certificate;

The client sends the data capture program with its own certificate to decrypt, and then use the intercepted encrypted certificate, and then sent to the server so you can see the plaintext.

Ciphertext against other path than https at both ends, the ends of https links as you, of course, can be seen in clear text.

HTTPS is a by asymmetric encryption algorithm (e.g., RSA algorithm) to generate the key negotiation and exchange, and then using a symmetric encryption key negotiated in the subsequent communication process communication, the reason why the two encryption methods to be used asymmetric encryption is that a large amount of calculation, if asymmetric encryption has to transmit the data, will affect the efficiency.

Guess you like

Origin blog.51cto.com/viphyy/2431248