


Other popular use cases for PolarProxy is to inspect encrypted traffic from IoT devices and other embedded products or to analyze otherwise encrypted traffic from mobile phones and tablets. PolarProxy is primarily designed for inspecting otherwise encrypted traffic from malware, such as botnets that use HTTPS for command-and-control of victim PCs. Because of this PolarProxy can be used as a generic TLS decryption proxy for just about any protocol that uses TLS encryption, including HTTPS, HTTP/2, DoH, DoT, FTPS, SMTPS, IMAPS, POP3S and SIP-TLS. PolarProxy doesn’t interfere with the tunnelled data in any way, it simply takes the incoming TLS stream, decrypts it, re-encrypts it and forwards it to the destination. PolarProxy is a transparent TLS proxy that outputs decrypted TLS traffic as PCAP files. The value 22 (0x16 in hexadecimal) has been defined as being “Handshake” content.Īs a consequence, tcp & 0xf0) > 2)] = 0x16 captures every packet having the first byte after the TCP header set to 0x16.This is a guest blog post by Erik Hjelmvik, an e xpert in network forensics and network security monitoring at NETRESEC. The first byte of a TLS packet define the content type. The offset, once multiplied by 4 gives the byte count of the TCP header, meaning ((tcp & 0xf0) > 2) provides the size of the TCP header. Tcp means capturing the 13th byte of the tcp packet, corresponding to first half being the offset, second half being reserved. Tcp & 0xf0) > 2)] = 0x16: a bit more tricky, let’s detail this below Tcp port 443: I suppose this is the port your server is listening on, change it if you need Tcpdump -ni eth0 “tcp port 443 and (tcp & 0xf0) > 2)] = 0x16)”Įth0: is my network interface, change it if you need
