

You will use command options to save the traffic to a packet capture (pcap) file. In this part, you will use tcpdump to capture the content of HTTP traffic. Internet connection Instructions Part 1: Capture and View HTTP Traffic.

In this lab, you will explore and capture HTTP and HTTPS traffic using Wireshark. Threat actors commonly use HTTPS to hide their activities. Just because a site uses HTTPS does not mean it is a trustworthy site. Regardless of HTTP or HTTPS, it is only recommended to exchange data with websites that you trust. This is done through the use of certificates that can be viewed later in this lab. This algorithm hides the true meaning of the data that is being exchanged. With HTTPS, encryption is used via a mathematical algorithm. With HTTP, there is no safeguard for the exchanged data between two communicating devices. HyperText Transfer Protocol (HTTP) is an application layer protocol that presents data via a web browser.
