LAB 13

“HTTP transfers are all in plain text or use simple encoding methods. This makes the protocol extremely vulnerable to packet sniffing. HTTP transfers can be protected by encrypting them with SSL/TLS.”

Exercise one: Sniffing HTTP

This exercise involved capturing HTTP packets between the client vm and server vm, surprisingly this seems to be quite an easy process. Packet sniffing can be used to steal sensitive data, of people who become victims of identity theft, etc.

This practical example was very interesting to participate in, as I am not an expert in this field.

This slideshow requires JavaScript.

Exercise two: Securing HTTP

Being able to secure the the HTTP from the server, really shows the power you can have over a network.

This slideshow requires JavaScript.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s