CONNECT creditlife.yirendai.com:443 HTTP/1.1 Host: creditlife.yirendai.com:443 Connection: Keep-Alive User-Agent: okhttp/3.4.1 A SSLv3-compatible ClientHello handshake was found. Fiddler extracted the parameters below. Version: 3.3 (TLS/1.2) Random: 20 42 DF F6 6F 42 56 D4 7A B1 70 19 6F 46 A5 89 EA 81 BA 47 17 3E FF DA 00 5C A5 13 6D 2F 25 7A "Time": 2101/4/2 3:23:12 SessionID: empty Extensions: renegotiation_info 00 server_name creditlife.yirendai.com extended_master_secret empty SessionTicket empty signature_algs sha512_rsa, sha512_ecdsa, sha384_rsa, sha384_ecdsa, sha256_rsa, sha256_ecdsa, sha224_rsa, sha224_ecdsa, sha1_rsa, sha1_ecdsa ALPN h2, spdy/3.1, http/1.1 ec_point_formats uncompressed [0x0] elliptic_curves secp256r1 [0x17], secp384r1 [0x18], secp521r1 [0x19] Ciphers: [C02B] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [C02F] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [009E] TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [C00A] TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [C009] TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [C013] TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA [C014] TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA [0033] TLS_DHE_RSA_WITH_AES_128_SHA [0039] TLS_DHE_RSA_WITH_AES_256_SHA [009C] TLS_RSA_WITH_AES_128_GCM_SHA256 [002F] TLS_RSA_AES_128_SHA [0035] TLS_RSA_AES_256_SHA Compression: [00] NO_COMPRESSION HTTP/1.1 200 Connection Established FiddlerGateway: Direct StartTime: 16:03:16.183 Connection: close EndTime: 16:06:23.016 ClientToServerBytes: 4060 ServerToClientBytes: 16985 This is a CONNECT tunnel, through which encrypted HTTPS traffic flows. Fiddler's HTTPS Decryption feature is enabled, but this specific tunnel was configured not to be decrypted. Settings can be found inside Tools > Options > HTTPS. A SSLv3-compatible ServerHello handshake was found. Fiddler extracted the parameters below. Version: 3.3 (TLS/1.2) SessionID: empty Random: 59 CD FE 40 D5 BA 12 1F CF FB BB F3 0F 29 DD 27 AB 3E 13 06 28 62 21 D0 D0 83 71 46 D9 21 0B 8E Cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [0xC02F] CompressionSuite: NO_COMPRESSION [0x00] Extensions: server_name empty renegotiation_info 00 ec_point_formats uncompressed [0x0], ansiX962_compressed_prime [0x1], ansiX962_compressed_char2 [0x2] SessionTicket empty ------------------------------------------------------------------ CONNECT creditlife.yirendai.com:443 HTTP/1.1 Host: creditlife.yirendai.com:443 Connection: Keep-Alive User-Agent: okhttp/3.4.1 A SSLv3-compatible ClientHello handshake was found. Fiddler extracted the parameters below. Version: 3.3 (TLS/1.2) Random: 90 FF 21 C3 3A 82 DB 5B 39 CC BC B8 D7 11 77 CC 99 84 06 9F 34 A7 5E 05 47 96 A7 65 8C 5C C5 77 "Time": 2073/9/28 8:47:12 SessionID: 22 52 2A 8D 72 8D 55 CE 5F E3 A6 57 C8 34 FE 2D A6 29 A4 E5 E0 33 FB 4C 38 03 D2 AF 20 BE FA CC Extensions: renegotiation_info 00 server_name creditlife.yirendai.com extended_master_secret empty SessionTicket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signature_algs sha512_rsa, sha512_ecdsa, sha384_rsa, sha384_ecdsa, sha256_rsa, sha256_ecdsa, sha224_rsa, sha224_ecdsa, sha1_rsa, sha1_ecdsa ALPN h2, spdy/3.1, http/1.1 ec_point_formats uncompressed [0x0] elliptic_curves secp256r1 [0x17], secp384r1 [0x18], secp521r1 [0x19] padding 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Ciphers: [C02B] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [C02F] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [009E] TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [C00A] TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [C009] TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [C013] TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA [C014] TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA [0033] TLS_DHE_RSA_WITH_AES_128_SHA [0039] TLS_DHE_RSA_WITH_AES_256_SHA [009C] TLS_RSA_WITH_AES_128_GCM_SHA256 [002F] TLS_RSA_AES_128_SHA [0035] TLS_RSA_AES_256_SHA Compression: [00] NO_COMPRESSION HTTP/1.1 200 Connection Established FiddlerGateway: Direct StartTime: 16:03:21.313 Connection: close EndTime: 16:03:27.134 ClientToServerBytes: 1597 ServerToClientBytes: 1980 This is a CONNECT tunnel, through which encrypted HTTPS traffic flows. Fiddler's HTTPS Decryption feature is enabled, but this specific tunnel was configured not to be decrypted. Settings can be found inside Tools > Options > HTTPS. A SSLv3-compatible ServerHello handshake was found. Fiddler extracted the parameters below. Version: 3.3 (TLS/1.2) SessionID: 22 52 2A 8D 72 8D 55 CE 5F E3 A6 57 C8 34 FE 2D A6 29 A4 E5 E0 33 FB 4C 38 03 D2 AF 20 BE FA CC Random: 59 CD FE 45 BB D2 E6 6E 16 34 94 20 F1 21 39 06 85 33 97 B8 45 8B 90 FE 88 12 36 02 FA DE 41 96 Cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [0xC02F] CompressionSuite: NO_COMPRESSION [0x00] Extensions: renegotiation_info 00 ------------------------------------------------------------------ CONNECT creditlife.yirendai.com:443 HTTP/1.1 Host: creditlife.yirendai.com:443 Connection: Keep-Alive User-Agent: okhttp/3.4.1 A SSLv3-compatible ClientHello handshake was found. Fiddler extracted the parameters below. Version: 3.3 (TLS/1.2) Random: 43 CA 16 79 84 8C 39 F6 C4 5D AB 48 9C D5 4F CB C8 43 E7 7E 1C 9B 0E E2 8C 2F 00 36 A4 D3 4F 72 "Time": 2034/5/18 11:45:07 SessionID: 22 52 2A 8D 72 8D 55 CE 5F E3 A6 57 C8 34 FE 2D A6 29 A4 E5 E0 33 FB 4C 38 03 D2 AF 20 BE FA CC Extensions: renegotiation_info 00 server_name creditlife.yirendai.com extended_master_secret empty SessionTicket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signature_algs sha512_rsa, sha512_ecdsa, sha384_rsa, sha384_ecdsa, sha256_rsa, sha256_ecdsa, sha224_rsa, sha224_ecdsa, sha1_rsa, sha1_ecdsa ALPN h2, spdy/3.1, http/1.1 ec_point_formats uncompressed [0x0] elliptic_curves secp256r1 [0x17], secp384r1 [0x18], secp521r1 [0x19] padding 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Ciphers: [C02B] TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 [C02F] TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [009E] TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 [C00A] TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA [C009] TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA [C013] TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA [C014] TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA [0033] TLS_DHE_RSA_WITH_AES_128_SHA [0039] TLS_DHE_RSA_WITH_AES_256_SHA [009C] TLS_RSA_WITH_AES_128_GCM_SHA256 [002F] TLS_RSA_AES_128_SHA [0035] TLS_RSA_AES_256_SHA Compression: [00] NO_COMPRESSION HTTP/1.1 200 Connection Established FiddlerGateway: Direct StartTime: 16:03:21.604 Connection: close EndTime: 16:06:22.058 ClientToServerBytes: 1132 ServerToClientBytes: 3962 This is a CONNECT tunnel, through which encrypted HTTPS traffic flows. Fiddler's HTTPS Decryption feature is enabled, but this specific tunnel was configured not to be decrypted. Settings can be found inside Tools > Options > HTTPS. A SSLv3-compatible ServerHello handshake was found. Fiddler extracted the parameters below. Version: 3.3 (TLS/1.2) SessionID: 22 52 2A 8D 72 8D 55 CE 5F E3 A6 57 C8 34 FE 2D A6 29 A4 E5 E0 33 FB 4C 38 03 D2 AF 20 BE FA CC Random: 59 CD FE 45 E2 0F 4B 1D 58 CD D2 17 85 63 EF 5D AA 0F 34 DE 5C B4 BC 94 3C CF 13 55 80 C8 CD C3 Cipher: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [0xC02F] CompressionSuite: NO_COMPRESSION [0x00] Extensions: renegotiation_info 00 ------------------------------------------------------------------