Wireshark to view HTTPS traffic

Source: Internet
Author: User
Tags ack

If there is a server-side certificate, then we can analyze the Web under the HTTPS communication situation, in particular scenarios have certain uses, such as external audit

The following is the configuration of the view HTTPS setting in Wireshark or Tshark

Wireshark Verification

Tshark Verification

Tshark-f "TCP and port 443"-I Eth2-o "SSL.KEYS_LIST:192.168.0.155,443,HTTP,/ROOT/TMP/A.CRT"

15.852877 192.168.0.155, 192.168.0.55 TCP-HTTPS > Sia-ctrl-plane [ACK] seq=1 ack=132 win=6912 len=0

15.854385 192.168.0.155-192.168.0.55 TLSv1 722 server Hello, Certificate, server Hello Done

15.854813 192.168.0.55-192.168.0.155 TLSv1 252 Client Key Exchange, change Cipher Spec, finished

15.857471 192.168.0.155, 192.168.0.55 TLSv1 change Cipher Spec

15.857721 192.168.0.155, 192.168.0.55 TLSv1 107 finished

15.857811 192.168.0.55-192.168.0.155 TCP sia-ctrl-plane > HTTPS [ACK] seq=330 ack=728 win=64972 len=0

15.859990 192.168.0.55-192.168.0.155 SSL 731 [SSL segment of a reassembled PDU]

15.899431 192.168.0.155, 192.168.0.55 TCP-HTTPS > Sia-ctrl-plane [ACK] seq=728 ack=1007 win=9344 len=0

15.902726 192.168.0.55-192.168.0.155 TCP xmcp > HTTPS [SYN] seq=0 win=8192 len=0 mss=1460 ws=4 sack_perm=1

15.902774 192.168.0.155, 192.168.0.55 TCP, HTTPS > XMCP [SYN, ACK] seq=0 ack=1 win=5840 len=0 mss=1460 sack_perm =1 ws=64

15.902887 192.168.0.55-192.168.0.155 TCP xmcp > HTTPS [RST] seq=1 win=0 len=0

15.909868 192.168.0.55-192.168.0.155 TCP 4789 > HTTPS [SYN] seq=0 win=8192 len=0 mss=1460 ws=4 sack_perm=1

15.909912 192.168.0.155, 192.168.0.55 TCP, HTTPS > 4789 [SYN, ACK] seq=0 ack=1 win=5840 len=0 mss=1460 sack_perm =1 ws=64

15.910026 192.168.0.55-192.168.0.155 TCP 4789 > HTTPS [RST] seq=1 win=0 len=0

15.921205 192.168.0.55-192.168.0.155 TCP 4790 > HTTPS [SYN] seq=0 win=8192 len=0 mss=1460 ws=4 sack_perm=1

15.921250 192.168.0.155, 192.168.0.55 TCP, HTTPS > 4790 [SYN, ACK] seq=0 ack=1 win=5840 len=0 mss=1460 sack_perm =1 ws=64

15.921359 192.168.0.55-192.168.0.155 TCP 4790 > HTTPS [RST] seq=1 win=0 len=0

15.930390 192.168.0.55-192.168.0.155 TCP 4791 > HTTPS [SYN] seq=0 win=8192 len=0 mss=1460 ws=4 sack_perm=1

15.930422 192.168.0.155, 192.168.0.55 TCP, HTTPS > 4791 [SYN, ACK] seq=0 ack=1 win=5840 len=0 mss=1460 sack_perm =1 ws=64

15.930532 192.168.0.55-192.168.0.155 TCP 4791 > HTTPS [RST] seq=1 win=0 len=0

15.991719 192.168.0.55-192.168.0.155 HTTP 107 post/all/rptsave http/1.1 (application/x-www-form-urlencoded)

309 15.991837 192.168.0.155-192.168.0.55 TCP-HTTPS > Sia-ctrl-plane [ACK] seq=728 ack=1060 win=9344 len=0

15.995828 192.168.0.155-192.168.0.55 HTTP 251 http/1.1 OK (text/html)

View the information of the certificate, Asn1view This tool is very useful

Wireshark to view HTTPS traffic

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.