mirror of
				https://github.com/drwetter/testssl.sh.git
				synced 2025-11-03 23:35:26 +01:00 
			
		
		
		
	@@ -7,7 +7,7 @@ The whole process is done manually.
 | 
			
		||||
 | 
			
		||||
* Start wireshark at a client or router. Best is during capture to filter for the target of your choice.
 | 
			
		||||
* Make sure you create a bit of encrypted traffic to your target. Attention, privacy: if you want to contribute, be aware that the ClientHello contains the target hostname (SNI).
 | 
			
		||||
* Make sure the client traffic is specific: For just "Android" do not use a browser! Be also careful with Google Apps, especially on older devices as they might has an own TLS stack
 | 
			
		||||
* Make sure the client traffic is specific: For just "Android" do not use a browser! Be also careful with Google Apps, especially on older devices as they might come with an own/updated TLS stack
 | 
			
		||||
* Stop recording.
 | 
			
		||||
* If needed sort for ClientHello.
 | 
			
		||||
* Look for the ClientHello which matches the source IP + destination you had in mind. Check the destination hostname in the SNI extension so that you can be sure, it's the right traffic.
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user