

In Firefox and Chrome, this can be accomplished by setting an environment variable called SSLKEYLOGFILE. Since we’re acting as an eavesdropper on the network (the exact thing that TLS is designed to prevent), we need to have one of the trusted parties share their secrets with us. Since TLS is designed to protect the confidentiality of the client and the server during transmissions, it’s logical that it’s designed so that either of them can decrypt the traffic but no one else can. The other thing that you’ll need to do before decrypting TLS-encrypted traffic is to configure your Web browser to export client-side TLS keys.

The first step in using it for TLS/SSL encryption is downloading it from here and installing it.

Wireshark is a commonly-known and freely-available tool for network analysis.
