Exporting HTTP objects

Exporting HTTP objects is a simple feature for exporting HTTP statistics—websites and files accessed by HTTP.

Getting ready

To export HTTP objects, choose File | Export Objects | HTTP.

How to do it...

To export HTTP objects, follow these steps:

  1. You can use this feature when capture is running, or you can save the captured file. You will get the following window:
    How to do it...
  2. From here you can get a list of the websites that were accessed, including the files that were accessed in each one of them. You can see the website, file types, size, and names.
  3. You can use the Save As or Save All buttons for saving the data in a file.
  4. In the Content Type column, you will see the following contents:
    • Text: text/plain, text/html, text/javascript—if it's a JavaScript, check what it is, it might be a security risk
    • Images: image/jpeg, image/gif, and other types of images—you can open it with a viewer
    • Applications: application/json, application/javascript, and other types of applications
    • Any other text file discovered by Wireshark

Tip

For the export HTTP objects feature to work, first go to TCP preferences and enable TCP packets reassembly (allow subdissector to reassemble TCP streams).

You will get a directory with all the objects captured in the capture file. Objects can be pictures (for example, packet 1052 and 1057 in the preceding screenshot), text (packets 1019, 1022, and others in the preceding screenshot), and others.

How it works...

This feature scans HTTP streams in the currently opened capture file or the running capture, takes reassembled objects such as HTML documents, image files, executable files, and other readable formats, and lets you save them to a disk. The saved objects can then be opened with the proper viewer, or they can be executed in the case of executable files just by clicking on them. This feature can be helpful for various purposes, including eavesdropping and saving objects for backup (for example, files that were sent through e-mails).

There's more...

You have several pieces of software that perform the same things graphically, some of them are as follows:

Tip

When you see an unknown website with an application that you don't know, and a filename that looks suspicious—Google it; it might be a risk (we will get back to this in Chapter 14, Understanding Network Security).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.14.141.171