Need to debug https

Posted on 2012-09-17
Last Modified: 2014-11-12
I'm trying to work with the Google Calendar API from some .Net code.

I'd like to debug this and looking into the dialog from an existing Outlook plug-in that synchronizes with Google would help.

Unfortunately (or fortunately depending on your PoV), this plug-in uses HTTPS, so there doesn't seem to be a way to decode the captured communications via WireShark.

Does anyone know of a tool that will capture "and" decode this HTTPS traffic so I can see what's happening?

From what I read Fiddler can decode SSL but from my experience you can only capture communications from a web browser.
Question by:klamerus
    LVL 32

    Expert Comment

    In your case, I would first verify if I can control the endpoint connection from my code.
    I don't know if you are using the REST api directly, or if you use some SDK wrapper.
    If you use the REST api and have some control over the connection then the following may work.

    I use the Axis TCPMonitor for http and SOAP debugging.

    It does not support SSL, so you need to add something like stunnel

    Start stunnel and set it something like this
    client = yes
    accept  = 88
    connect =

    Open in new window

    change to the actual address of the api endpoint.

    then start TCPMonitor, and add a reverse proxy definition to listen on port 443, and forward it to localhost:88

    you API calls must be changed to refer to localhost port 443 but without SSL.

    your code --http--> localhost:443 --http--> localhost:88 --https-->

    it may not work if google are doing redirections to load balance the service.
    LVL 1

    Author Comment

    I can't really do any of this with the Outlook plug-in which is a commercial tool (gSyncIt).  At least not from what I understand you're describing.
    LVL 32

    Accepted Solution

    you're right.

    If your organization has WebSense or a similar filtering software, then you can use it to trace and log https sessions, although it is a major pita.

    Otherwise you have a problem.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Learn about cloud computing and its benefits for small business owners.
    Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
    This Micro Tutorial will demonstrate how to analyze your website's back links using a network graph powered by a fusion table.
    Shows how to create a shortcut to site-search Experts Exchange using Google in the Chrome browser. This eliminates the need to type out whenever you want to search the site. Launch the Search Engine Menu: In chrome, via you…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now