Hello forum
We intend to use a data recovery software running under Windows which sends "telemetric data" back home (this is declared from the manufacturer). Of course we would like to know everything what this application does...
In the Fiddler docs, different setups are described (e.g. capture traffic from another machine, decrypt traffic from a hostname only)
Question:
What is a good approch to find out, how this application does encrypt it's telemetric data and what kind of "transport-encryption" it does use
(in order to be able to setup a working Fiddler environment)?
Thank you very much for any feedback!
Joe
PS:
I don't want to mention the name of the application in question, in order to prevent the manufacturer to circumvent our efforts :-)
We intend to use a data recovery software running under Windows which sends "telemetric data" back home (this is declared from the manufacturer). Of course we would like to know everything what this application does...
In the Fiddler docs, different setups are described (e.g. capture traffic from another machine, decrypt traffic from a hostname only)
Question:
What is a good approch to find out, how this application does encrypt it's telemetric data and what kind of "transport-encryption" it does use
(in order to be able to setup a working Fiddler environment)?
Thank you very much for any feedback!
Joe
PS:
I don't want to mention the name of the application in question, in order to prevent the manufacturer to circumvent our efforts :-)