Notice that the source address is your IP address.
Expand Internet Protocol Version 4 to view IP details.You can use ipconfig /all and arp -a to confirm. The destination should be your default gateway's MAC address and the source should be your MAC address. Observe the Destination and Source fields.Expand Ethernet II to view Ethernet details.Notice that it is an Ethernet II / Internet Protocol Version 4 / Transmission Control Protocol frame. Observe the packet details in the middle Wireshark packet details pane.The first three packets (TCP SYN, TCP SYN/ACK, TCP ACK) are the TCP three way handshake. Observe the traffic captured in the top Wireshark packet list pane.To view all related traffic for this connection, change the filter to ip.addr =, where is the destination address of the HTTP packet.Īctivity 3 - Analyze TCP Connection Traffic.Select the first TLS packet labeled Client Hello.To view only HTTPS traffic, type ssl (lower case) in the Filter box and press Enter. These activities will show you how to use Wireshark to capture and analyze Hypertext Transfer Protocol Secure (HTTPS) traffic.Īctivity 1 - Capture HTTPS Traffic Īctivity 2 - Select Destination Traffic Wireshark is a free and open source packet analyzer used for network troubleshooting and analysis. 11 Activity 9 - Analyze HTTPS Encrypted Data Exchange.10 Activity 8 - Analyze SSL/TLS New Session Ticket Traffic.
9 Activity 7 - Analyze SSL/TLS Client Key Exchange Traffic.8 Activity 6 - Analyze SSL/TLS Certificate Traffic.7 Activity 5 - Analyze SSL/TLS Server Hello Traffic.