![]() ![]() First, we run a simple Apache httpd server that accepts plain-text connections on port 80 and TLS encrypted connections on port 443. To start off, let us look at an example, of how we can debug HTTP traffic with tshark. ![]() The debugging shown here can of course be done using the GUI-based Wireshark as well. Tshark is the CLI-based version of Wireshark and provides more or less the same capabilities for dissecting network packets. In this case it is easy enough to use a tool like tcpdump to capture the packets and inspect them with a tool like Wireshark.įor the demonstrations below, tshark is used instead of Wireshark. This is trivial when HTTP requests are sent over an unencrypted channel. To debug HTTP requests, it may be useful to capture traffic and look at the packets that are sent back and forth between the client and the server. This entry was posted in Security and tagged apache security ssl tcpdump tls tshark wireshark on by Simon Studer
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |