tsarpaul / goproxy

goproxy
0 stars 0 forks source link

How can we sniff the TLS 1.3 #1

Open gokaybiz opened 5 years ago

gokaybiz commented 5 years ago

What should we do for the grab "CONNECT" https request?

Thanks for everything, u and ur projects are awesome dude!

tsarpaul commented 5 years ago

Unfortunately I found out Go doesn't support TLS 1.3 fully (specifically early data) so the proxy isn't applicable to the new Facebook apks :(

gokaybiz commented 5 years ago

Hmm, alright, so exported certs for what?

Well, then Can we read, save the url before request sent with modding libs or apk source? I mean, without any network sniffing. Is this possible? Hereof I'm a little bit ignorant... I need pseudo request for spoofing in latest version(s) :)

gokaybiz commented 5 years ago

In all probability, thank you so much...

tsarpaul commented 5 years ago

Hmm, alright, so exported certs for what?

Well, then Can we read, save the url before request sent with modding libs or apk source? I mean, without any network sniffing. Is this possible? Hereof I'm a little bit ignorant... I need pseudo request for spoofing in latest version(s) :)

Well you won't get far with URLs because the app is unable to connect to the server so you won't get the app's normal flow. It is possible to patch the app to just dump outgoing requests if you find the function responsible (Frida is very useful for this type of stuff). I'd suggest finding a working TLS 1.3 proxy instead, I'll write if I find anything useful :)