The ssldump tool is not perfect although. It can produce only text output. The output is a mixture of SSL handshaking requests and data connections.
This little tool https://github.com/akozadaev/ssld-extract can help to extract a single SSL session. An example usage is provided below.
root@server:~/ssld-extract/# ssldump -n -r example1.pcap > example1.pcap.txt root@server:~/ssld-extract/pp# python ssld-extract.py -c -n1 ~/ssld-extract/example1.pcap.txt New TCP connection #1: 192.168.0.2(57122) <-> 72.26.232.202(443) 1 1 0.1946 (0.1946) C>S Handshake ClientHello Version 3.1 resume [32]= 7b 9a 08 2f 3f c0 5e 70 c8 9e b6 f8 61 a0 4e 9e d9 84 07 e5 94 13 f8 e8 87 33 96 0d f4 a4 9f 6a cipher suites Unknown value 0xc00a Unknown value 0xc014 Unknown value 0x88 Unknown value 0x87 TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_DSS_WITH_AES_256_CBC_SHA Unknown value 0xc012 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA ...
compression methods NULL 1 2 0.3973 (0.2027) S>C Handshake ServerHello Version 3.1 session_id[32]= d4 65 5e b6 3d 33 88 8c bd 7e 56 65 13 71 9f 52 30 47 ea e1 c0 d6 1f 72 12 b9 2f 8f 6b 42 b2 68 cipherSuite TLS_RSA_WITH_RC4_128_SHA compressionMethod NULL 1 3 0.3974 (0.0001) S>C Handshake Certificate 1 4 0.3974 (0.0000) S>C Handshake ServerHelloDone 1 5 0.4006 (0.0031) C>S Handshake ClientKeyExchange 1 6 0.4006 (0.0000) C>S ChangeCipherSpec 1 7 0.4006 (0.0000) C>S Handshake 1 8 0.5794 (0.1788) S>C ChangeCipherSpec 1 9 0.5794 (0.0000) S>C Handshake 1 10 0.5814 (0.0019) C>S application_data 1 11 0.5819 (0.0004) C>S application_data 1 12 0.7806 (0.1987) S>C application_dataAs you can see it was able to extract the single connection what is a huge help if you need to analyze a big tcpdump file.
No comments:
Post a Comment