Get the latest tech news
How to inspect TLS encrypted traffic
Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.
If you, on the other hand, want to analyse network traffic from your own Firefox or Chrome browser in Wireshark, then the TLS key log approach is probably the best solution. In fact, many TLS inspection proxies and Next-Generation Firewalls ( NGFW) only make the decrypted payload available to the internal application or appliance. Decrypted TLS traffic in PCAP format can easily be ingested into other tools or be replayed to a network interface for inspection by an external security appliance.
Or read this on Hacker News