In this section we will talk about the HTTPs and TLS attacks.
The HTTP is an application layer protocol used to access resources on the internet. Since HTTP transmits data in plaintext, it cannot provide confidentiality, integrity, or authenticity of the transmitted data

Now let’s see some attacks.

Now let’s take a look at the Public Key Infrastructure.

Now let’s take a look at the Public Key Infrastructure.

Now let’s solve the challenge

Now let’s decrypt the flag using the pem

Now let’s cat the decrypted file.

As we see we got the flag.