How can i decrypt TLV, can i get tlv key from memory in windows machine?
And can i decrypt it after "secure" command?
If you dig into the code on either side of a live sessions you can obtain the key from process memory at certain points during the setup. On the other hand encrypted TLVs are a transparent layer like SSL and reading data after decryption by debugging existing tooling may be simpler if you are just looking to debug some data being transferred in a specific scenario.
If you are asking to decrypt live traffic or from a network packet log, I do not know of any specific tooling with the pattern already written however it would technically be possible to create a wireshark plugin that could decode and display TLV packet data if you retrieved the keys from the server and client sides of the conversation.
After "secure" command keys are changed?
After secure the encryption key is renegotiated. So you would need to capture each time it occurs.
Most helpful comment
If you dig into the code on either side of a live sessions you can obtain the key from process memory at certain points during the setup. On the other hand encrypted TLVs are a transparent layer like SSL and reading data after decryption by debugging existing tooling may be simpler if you are just looking to debug some data being transferred in a specific scenario.
If you are asking to decrypt live traffic or from a network packet log, I do not know of any specific tooling with the pattern already written however it would technically be possible to create a wireshark plugin that could decode and display TLV packet data if you retrieved the keys from the server and client sides of the conversation.