# PicoCTF - WebNet0 ## Background [解密TLS協議全記錄之利用wireshark解密](https://blog.csdn.net/walleva96/article/details/106844033) ## Recon 這一題其實就只是利用wireshark把訊息解密就這樣,所以看了一些文章後就按圖施工就好,解密完後就直接string search就找到了 ## Exploit - TLS Decrypt 1. 在`Edit/Preferences/RSA Keys/`中`Add new keyfile`  2. 加入題目給的private key file後記得要重新開啟該pcap file 
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up