
Just click Follow/TLS stream on the packet. Preferences > Protocols > TLS (SSL for older versions) > RSA key list editįill the server address, port, protocol (probably http), key file path, and key password. Enter a file name and select a location for SSL debug file. The main panel of the window will show protocol settings. In the Preferences window, expand the Protocols node in the left-hand menu tree. In the top menu bar, click on Edit, and then select Preferences from the drop-down menu. All you have to do is to add this key to Wireshark. Start a packet capture session in Wireshark. If you have a private key, you can use it to decrypt HTTPS traffic. This debug text file should contain decrypted traffic. If you don’t see decrypted traffic after selecting Follow/TLS Stream and none of the workarounds works (saving the capture file and reopening it or setting Reassemble TLS Application Data spanning multiple TLS records), then you can dump it to TLS debug file which can be configured in the same window as (Pre)-Master-Secret log file. It can be found at the following path: Preferences > Protocols > TLS (SSL for older versions) > (Pre)-Master-Secret log filename. The next step is to open the PCAP file with Wireshark and configure (Pre)-Master-Secret log file.

You can start tcpdump/Wireshark to capture traffic now. Java -jar extract-tls-secrets.jar /tmp/secrets.logĪll Java application TLS shared secrets should be dumped to the /tmp/secrets.log file now.
