I set up an SSH tunnel between my machine and a proxy server (which I also have access to) with dynamic port forwarding and then I use it as a SOCKS5 proxy.
My question is – if I visit Google on my browser is it possible for me to see the data transfer between my browser and Google as unencrypted packets on the proxy server? I know that the data from my machine to the proxy server is encrypted by SSH and the data from my proxy server to Google is also encrypted (probably?). But in the middle of these two steps, is there a phase where the proxy server decrypts and re-encrypts the data and can see the request body etc.
My guess is that since it’s an HTTPS connection so there will be a key exchange first and all communications between my browser and the website after that will be encrypted but I want to confirm my doubts. I tried some packet sniffing with tcpdump but all I could see was the domain names and IPs the proxy was connecting to on my behalf but not the actual data which I’m guessing was already encrypted before being intercepted.