extract the x509 ssl certificate from a pcap file

https://www.wireshark.org/lists/wireshark-users/201003/msg00080.html

1) type "ssl.handshake.certificate" in the filter.
2) make sure the setting "Allow subdissector to reassemble TCP streams" is on in the TCP protocol preferences
3) Then go to the packet which contains the SSL handshake message "Certificate"
4) In the packet detail pane, expand the SSL protocol
5) Expand the "Certificate" TLS record
6) Expand the "certificate" handshake protocol
7) Expand the list of certificates. There is now a list of certificate length and certificates (the list could be only 1 certificate). The first certificate is the server certificate, the second it's signing CA, the third the CA that signed the CA, etc.
8) Now rightclick on the certificate that you want to export
9) Choose "Export selected packet bytes..."
10) Choose a filename and click on save

You now have a file containing the certificate in DER format. You can use openssl to process the certificate as needed.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值