4.6.6.5 Lab Using Wireshark To Examine HTTP and HTTPS
4.6.6.5 Lab Using Wireshark To Examine HTTP and HTTPS
Objectives
Part 1: View HTTP traffic
Part 2: Capture and view HTTPS traffic
Background / Scenario
HyperText Transfer Protocol (HTTP) is an application layer protocol that presents data via a web browser.
With HTTP, there is no safeguard for the exchanged data between two communicating devices.
With HTTPS, encryption is used via a mathematical algorithm. This algorithm hides the true meaning of the
data that is being exchanged. This is done through the use of certificates that can be viewed later in this lab.
Regardless of HTTP or HTTPS, it is only recommended to exchange data with websites that you trust. Just
because a site uses HTTPS does not mean it is a trustworthy site. Threat actors commonly use HTTPS to
hide their activities.
In this lab, you will explore HTTP and HTTPS traffic using Wireshark.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Lab - Using Wireshark to Examine HTTP and HTTPS
c. Browse through the different HTTP messages and select the POST message.
d. In the lower window, the message is displayed. Expand the HTML Form URL Encoded: application/x-
www-form-urlencoded section.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Lab - Using Wireshark to Examine HTTP and HTTPS
a. In the ~/lab.support.files/pcaps/ directory for the user analyst, open the httpsdump.pcap file.
b. In the Wireshark application, expand the capture window vertically and then filter by HTTPS traffic via port
443.
Enter tcp.port==443 as a filter, and click Apply.
c. Browse through the different HTTPS messages and select an Application Data message.
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Lab - Using Wireshark to Examine HTTP and HTTPS
Reflection
1. What are the advantages of using HTTPS instead of HTTP?
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4