8.5 CERTIFICIATE INTERCEPT IN THE MIDDLE
EXERCISE 8.5: CERTIFICATE INTERCEPT IN THE MIDDLE
In the next section, we will talk about TLS, the security protocol that underlies HTTPS. TLS relies on the certificiates you learned about in this section. Going back to your HTTP proxy, intercept some more HTTPS traffic and see if you can figure out when the certificate is being sent.
This is a tough exercise and more for those interested in experimentation and tinkering. As a hint, certificates are not sent in PEM format, but DER. This is a binary format. But it’s not encrypted. You can try poking around for certain binary byte combinations. You could also use openssl to convert the crtificates you’ve created into DER format and examine them in a hex editor to see if there are common bytes to look for.