I'm doing vulnerability research on a client/server architecture that uses a custom proprietary protocol sent over SSL
(port 443). I need to be able to intercept the traffic, and be able to view it in clear-text in something like Wireshark, modify the traffic and then send it to the server. The "client" is a Microsoft office plugin. My end goal is to be able to fuzz the unencrypted network communications.
I've tried generating a self-signed certificate with OpenSSL and importing the private key into Wireshark as a "data" protocol, but no luck. I still see the data as "Encrypted Application Data".
I've tried following these two links:
- Wirewatcher: Decrypting SSL traffic with Wireshark, and ways to prevent it
- Wireshark Wiki: Secure Socket Layer (SSL)
but they provide examples for HTTP
. I am not sure if there's any difference, because this is a proprietary protocol (still sent over port 443).
My end goal is to be able to use a fuzzer, such as Sulley, to probe the server for vulnerabilities. Does anyone recommend a good way to accomplish this?