BoringSSLKeys
BoringSSLKeys copied to clipboard
Grab your libboringssl keys to decrypt traffic (pcaps)
BoringSSLKeys
- Allows use of
SSL_CTX_set_keylog_callbackin Apples version of libboringssl - Logs to console and cached file
CLIENT_RANDOMCLIENT_HANDSHAKE_TRAFFIC_SECRETSERVER_HANDSHAKE_TRAFFIC_SECRETCLIENT_TRAFFIC_SECRET_0SERVER_TRAFFIC_SECRET_0EXPORTER_SECRET
Required
- iOS 13.3.1
- Jailbroken using Mobile Substrate
Suggested
- rvictl (to connect iOS device)
- tcpdump (To capture packets)
- Wireshark (to decrypt pcaps)
Useage
- rvictl -s UDID
- tcpdump -i rvi0 -w capture.pcap -P
- Run the app you want
- Pull keylog from
/var/mobile/Containers/Data/Application/{UUID}/Library/Caches/BoringSSLKey.keylog - wireshark -r capture.pcap -o tls:keylog_file:BoringSSLKey.keylog
- Science
Console.app Output Filtered by [BoringSSLKey]
[BoringSSLKey] CLIENT_RANDOM STUFF STUFF
[BoringSSLKey] Writing to: /var/mobile/Containers/Data/Application/{UUID}/Library/Caches/BoringSSLKey.keylog
[BoringSSLKey] CLIENT_HANDSHAKE_TRAFFIC_SECRET STUFF STUFF
[BoringSSLKey] Writing to: /var/mobile/Containers/Data/Application/{UUID}/Library/Caches/BoringSSLKey.keylog
[BoringSSLKey] SERVER_HANDSHAKE_TRAFFIC_SECRET STUFF STUFF
[BoringSSLKey] Writing to: /var/mobile/Containers/Data/Application/{UUID}/Library/Caches/BoringSSLKey.keylog