

We put in the website URL in the Chrome browser and the first thing that happens is the DNS lookup.īy filtering on udp.port = 53, we see 4 DNS packets. There are 3 main stages when accessing a website: So, the walk-through below will focus on HTTP, so we can view the details of the HTTP packets. In a previous post, MadPackets walked-through an HTTPS request to a static website hosted on AWS S3. Obviously, a public website won’t share the private key but if you are building your own server/website, you can decrypt the contents of HTTPS using the private key. A Wireshark packet capture will not natively display the HTTPS packets, but if you have the server private key, you can decrypt the capture and view the contents in Wireshark. Transport Layer Security (TLS) provides the encryption for HTTPs traffic with algorithms such as SHA-256.

In fact, the majority of websites default to using HTTPS.

In a real-world example, a user may be sitting at home browsing the internet – IE going to web pages, where the web page is hosted on AWS.
