


In this lab, you will explore and capture HTTP and HTTPS traffic using Wireshark. Threat actors commonly use HTTPS to hide their activities. Just because a site uses HTTPS does not mean it is a trustworthy site. Regardless of HTTP or HTTPS, it is only recommended to exchange data with websites that you trust.

This is done through the use of certificates that can be viewed later in this lab. This algorithm hides the true meaning of the data that is being exchanged. With HTTPS, encryption is used via a mathematical algorithm. With HTTP, there is no safeguard for the exchanged data between two communicating devices. HyperText Transfer Protocol (HTTP) is an application layer protocol that presents data via a web browser. Part 2 : Capture and view HTTPS traffic Background / Scenario Lab – Using Wireshark to Examine HTTP and HTTPS Traffic (Answers Version)Īnswers Note : Red font color or g ray highlights indicate text that appears in the instructor copy only.
