解密HTTPS流量并将隧道传输到主机

解密HTTPS流量并将隧道传输到主机

本文介绍了Fiddler2:解密HTTPS流量并将隧道传输到主机:443的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我使用Fiddler2分析一些使用https连接的页面.我启用了HTTPS解密,但是在日志中仍然看到一些Tunnel to host:443条目.我可以在日志中看到解密的HTTPS流量,因此我认为解密是有效的.

I use Fiddler2 to analyse some pages that use https connections. I enabled HTTPS decryption, but I still see some Tunnel to host:443 entries in my log. I can see decrypted HTTPS traffic in the log, so I assume the decyption works.

我认为,打开连接时,除了解密的日志条目外,还会创建一个通往host:443的隧道条目.

I think, that a Tunnel to host:443 entry is created in addition to the decrypted log entry when the connection is opened.

我的假设是正确的还是我错过了什么?

Is my assumption correct or did I miss something?

推荐答案

是的,这是预期的.

如果单击Tunnel to Host:443,则会在统计标签上看到以下内容:

If you click on Tunnel to Host:443 you'll see the following on the Statistics tab:

The selected session is a HTTP CONNECT Tunnel. This tunnel enables a client to
send raw traffic (e.g. HTTPS-encrypted streams or WebSocket messages) through
a HTTP Proxy Server (like Fiddler).

如果愿意,可以通过单击Rules> Hide Connects自动隐藏这些隧道.

You can automatically hide these tunnels if you like by clicking Rules > Hide Connects.

这篇关于Fiddler2:解密HTTPS流量并将隧道传输到主机:443的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!

08-04 15:47