I'm working on a project where I have access to server certificates and want to intercept HTTPS traffic for monitoring purposes; When getting the private key from an X509Certificate from the cert store, I'm constantly getting the error "the length of the data to decrypt is not valid for the size of this key" when using any of the byte arrays within the tcpPacket.
Hey guys, I've seen the following post https://github.com/dotpcap/sharppcap/issues/31 on the sharppcap repo regarding SSL interception.
I'm working on a project where I have access to server certificates and want to intercept HTTPS traffic for monitoring purposes; When getting the private key from an X509Certificate from the cert store, I'm constantly getting the error "the length of the data to decrypt is not valid for the size of this key" when using any of the byte arrays within the tcpPacket.
Anyone got any thoughts?