Skip to main content

encryption - Decrypt SSL traffic with the openssl command line tool 7

Generating the master secret/key I followed the steps outlined in my shell script. I validated that I am passing data correctly to it by manually entering these steps several times (entering $key manually) and ultimately I arrive at the same outcome/data in this case


key = decrypted pre master key from previous step


03033ab0d673caefc4a9f6d35cf51d349815d67a09ac454f11dfb9741c96001a
66a3e82f688b82138403018384cf35f2

mseed.key = "master secret" + client.random + server.random The file is a binary file when I use that the hexdump xxd -p mseed.key so you can see the data:


6d617374657220736563726574 5b689404b500456eef2f1a79ec782eb3ee
aac3a8d7c02ae03c8426f363b18a33 5b6894043bb1289e158b0278ef66dc
53c9fa71e75e900739af2657cd4476ec1e

Note: the spaces are not in the data I added those manually to make it clear

client.random xxd -p crnd.bin


5b689404b500456eef2f1a79ec782eb3eeaac3a8d7c02ae03c8426f363b1
8a33

server.random xxd - srnd.bin


5b6894043bb1289e158b0278ef66dc53c9fa71e75e900739af2657cd4476
ec1e

just so I am clear those randoms also include the unix time prefixed (correct?)


key=${1} #passed to shell script 
openssl dgst -sha256 -mac hmac -macopt hexkey:$key a1
openssl dgst -sha256 -mac hmac -macopt hexkey:$key a2
openssl dgst -sha256 -mac hmac -macopt hexkey:$key a3
openssl dgst -sha256 -mac hmac -macopt hexkey:$key a4

The next step is:


cat a1 mseed.key | openssl dgst -sha256 -mac hmac -macopt hexkey:$key -binary >k1
cat a2 mseed.key | openssl dgst -sha256 -mac hmac -macopt hexkey:$key -binary >k2
cat a3 mseed.key | openssl dgst -sha256 -mac hmac -macopt hexkey:$key -binary >k3
cat a4 mseed.key | openssl dgst -sha256 -mac hmac -macopt hexkey:$key -binary >k4

Follwed by extracting the master secret


cat k1 k2 | head -c48 | xxd -p -c48 > master_secret.hex
truncate -s-1 master_secret.hex

master_secret at this point


$cat master_secret.hex
ee45b637f95ddf3b3bf51661cdf4e07bdd63a67f2d2df776322992b3fd871fe4ba38debcd7179bf4
ef8b8bb814fe4544d

From my wireshark log I extracted the client random during the conversation and saved it as the binary file crnd.bin


Random: 5b689404b500456eef2f1a79ec782eb3eeaac3a8d7c02ae0...
GMT Unix Time: Aug 6, 2018 14:31:32.000000000 Eastern Daylight Time
Random Bytes: b500456eef2f1a79ec782eb3eeaac3a8d7c02ae03c8426f3...

Subsequently I capture the server time and random bytes and save it as srnd.bin


Random: 5b6894043bb1289e158b0278ef66dc53c9fa71e75e900739...
GMT Unix Time: Aug 6, 2018 14:31:32.000000000 Eastern Daylight Time
Random Bytes: 3bb1289e158b0278ef66dc53c9fa71e75e900739af2657cd...

Dave, At this point I am stumped what I could be missing. I don't think I am missing something like a null in a variable or anything I've meticulously gone over the data and steps and don't see what I could be missing. Do you spot anything with these steps? Thanks

Comments

Popular Posts

Use Google instead of Bing with Windows 10 search

I want to use Google Chrome and Google search instead of Bing when I search in Windows 10. Google Chrome is launched when I click on web, but it's Bing search. (My default search engine on Google and Edge is http://www.google.com ) I haven't found how to configure that. Someone can help me ? Answer There is no way to change the default in Cortana itself but you can redirect it in Chrome. You said that it opens the results in the Chrome browser but it used Bing search right? There's a Chrome extension now that will redirect Bing to Google, DuckDuckGo, or Yahoo , whichever you prefer. More information on that in the second link.

linux - Using an index to make grep faster?

I find myself grepping the same codebase over and over. While it works great, each command takes about 10 seconds, so I am thinking about ways to make it faster. So can grep use some sort of index? I understand an index probably won't help for complicated regexps, but I use mostly very simple patters. Does an indexer exist for this case? EDIT: I know about ctags and the like, but I would like to do full-text search. Answer what about cscope , does this match your shoes? Allows searching code for: all references to a symbol global definitions functions called by a function functions calling a function text string regular expression pattern a file files including a file

How do I transmit a single hexadecimal value serial data in PuTTY using an Alt code?

I am trying to sent a specific hexadecimal value across a serial COM port using PuTTY. Specifically, I want to send the hex codes 9C, B6, FC, and 8B. I have looked up the Alt codes for these and they are 156, 182, 252, and 139 respectively. However, whenever I input the Alt codes, a preceding hex value of C2 is sent before 9C, B6, and 8B so the values that are sent are C2 9C, C2 B6, and C2 8B. The value for FC is changed to C3 FC. Why are these values being placed before the hex value and why is FC being changed altogether? To me, it seems like there is a problem internally converting the Alt code to hex. Is there a way to directly input hex values without using Alt codes in PuTTY? Answer What you're seeing is just ordinary text character set conversion. As far as PuTTY is concerned, you are typing (and reading) text , not raw binary data, therefore it has to convert the text to bytes in whatever configured character set before sending it over the wire. In other words, when y

networking - Windows 10, can ping other PC but cannot access shared folders! What gives?

I have a computer running Windows 7 that shares a Git repo on drive D. Let's call this PC " win7 ". This repo is the origin of a project that we push to and pull from. The network is a wireless network. One PC on this network is running on Windows 10. Let's call this PC " win10 ". Win10 can ping every other PC on the network including win7 . Win7 can ping win10 . Win7 can access all shared files on win10 . Neither of the PCs have passwords. Problem : Win10 cannot access any shared files on win7 , not from Explorer, nor from Git Bash or any other Git management system (E-Git on Eclipse or Visual Studio). So, win10 cannot pull/push. Every other PC on the network can access win7 shared files and push/pull to/from the shared Git origin. What's wrong with Windows 10? I have tried these: Control Panel\All Control Panel Items\Network and Sharing Center\Advanced sharing settings\ File sharing is on, Discovery is on, Password protected sharing is off Adapte