Wireshark mailing list archives

Re: dissecting HTTPS traffic


From: Mark Semkiw <Mark.Semkiw () commtrans org>
Date: Mon, 12 Oct 2015 18:22:45 +0000

All you can really do at that point is analyze the endpoints and see if you can get any info from that.  Well I guess 
you could setup your own man-in-the-middle attack, but I wouldn’t suggest it.

Mark Semkiw, Senior Network Engineer

CCNA  CNSE  WCNA


From: <wireshark-users-bounces () wireshark org<mailto:wireshark-users-bounces () wireshark org>> on behalf of Noam 
Birnbaum
Reply-To: Community support list for Wireshark
Date: Friday, October 9, 2015 at 4:12 PM
To: "wireshark-users () wireshark org<mailto:wireshark-users () wireshark org>"
Subject: [Wireshark-users] dissecting HTTPS traffic

Hey folks,

One of our clients has recently been having their WAN bandwidth eaten up, and we've narrowed it down to one executive's 
computer.

Now we want to dissect that computer's traffic to see what it's doing. However, much of it is HTTPS, so we can't see 
the content. Any suggestions on getting a useful analysis?

Thanks!
___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users () wireshark org>
Archives:    https://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
             mailto:wireshark-users-request () wireshark org?subject=unsubscribe

Current thread: