Encrypted protocol analysis

Decrypting HTTPS Traffic

When investigating web traffic, analysts often run across encrypted traffic. This is caused by using the Hypertext Transfer Protocol Secure (HTTPS) protocol for enhanced security against spoofing, sniffing and intercepting attacks. HTTPS uses TLS protocol to encrypt communications, so it is impossible to decrypt the traffic and view the transferred data without having the encryption/decryption key pairs. As this protocol provides a good level of security for transmitting sensitive data, attackers and malicious websites also use HTTPS. Knowing how to use key files to decrypt encrypted traffic and investigate the traffic activity, is a must-have skill.

The packets will appear in different colours as the HTTP traffic is encrypted. Also, protocol and info details (actual URL address and data returned from the server) will not be fully visible.


Use the Desktop/exercise-pcaps/https/Exercise.pcap file.

What is the frame number of the Client Hello message sent to accounts.google.com?


Decrypt the traffic with the KeysLogFile.txt file. What is the number of HTTP2 packets?

Edit -> Preferences -> Protocols -> TLS -> Browse for (Pre)-Master-Secret log filename -> KeysLogFile.txt


Go to Frame 322. What is the authority header of the HTTP2 packet? (Enter the address in defanged format.)

authority header

Investigate the decrypted packets and find the flag! What is the flag?

File -> Export Objects -> HTTP -> Save txt file to Desktop -> Open file.