Jump to content

Recommended Posts

Posted

Its not about HTTPS but taping into the 127.0.0.1 interface .

 

You can't capture on the local address 127.0.0.1 with a Windows packet capture driver like WinPcap

because Windows TCP/IP stack does not implement a network loopback interface.

You can, however, use a raw socket sniffer like RawCap to capture localhost network traffic in Windows.

Hope it can help you.  :)

AutoIt 3.3.14.2 X86 - SciTE 3.6.0WIN 8.1 X64 - Other Example Scripts

Posted

hey thanks... that would help me a lot...

 

RawCap.exe only captures IPv4 traffic.

.NET Framework 2.0 and administrator privileges are needed for run RawCap.

RawCap takes two arguments; the first argument is the IP address or interface number to sniff from,

the second is the path/file to write the captured packets to.

 

ex :

RawCap.exe 192.168.0.23 dumpfile.pcap

RawCap.exe 127.0.0.1 localhost_capture.pcap

Not yet tried, but interested if you succeed to capture localhost network traffic !  ;)

AutoIt 3.3.14.2 X86 - SciTE 3.6.0WIN 8.1 X64 - Other Example Scripts

Posted (edited)

Would it be possible to know the data sent for a POST request ?

 

Yes, for example if i upload a picture with TinyPicSharer i get :

201403241520233.jpg

but as it's a "Content-Type: multipart/form-data",

some data are not displayed by HttpHeaderWatcher because they are located after the binary data's file.

So I need to find a better way for parse the header request...  :sweating:

Edit : sorry i have mixed simple "header" and "Raw Stream",

HttpHeaderWatcher returns well simple Header Request, but not the "Raw Stream" who could return more details.

Edited by wakillon

AutoIt 3.3.14.2 X86 - SciTE 3.6.0WIN 8.1 X64 - Other Example Scripts

  • 2 months later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...