Internet connection Instructions Part 1: Capture and View HTTP Traffic.In this lab, you will explore and capture HTTP and HTTPS traffic using Wireshark. Threat actors commonly use HTTPS to hide their activities. Just because a site uses HTTPS does not mean it is a trustworthy site. Regardless of HTTP or HTTPS, it is only recommended to exchange data with websites that you trust. This is done through the use of certificates that can be viewed later in this lab. This algorithm hides the true meaning of the data that is being exchanged. With HTTPS, encryption is used via a mathematical algorithm. With HTTP, there is no safeguard for the exchanged data between two communicating devices. HyperText Transfer Protocol (HTTP) is an application layer protocol that presents data via a web browser. Part 2: Capture and view HTTPS traffic Background / Scenario.Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. 10.6.7 Lab – Using Wireshark to Examine HTTP and HTTPS Traffic (Instructor Version)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |