8.1: WHAT’S IN WEB TRAFFIC?
EXERCISE 8.1: WHAT’S IN WEB TRAFFIC?
Pretend to be Eve and examine some of your own encrypted traffic. That is, configuring your browser to use your proxy, navigate to some HTTP web sites and spy on your own data. Hint: Are there parts of the secure communications that are still in plaintext?
If you don’t know how to configure your browser for proxying, please do some searching on the search engine of your choice! Be aware that you many not be able to configure your browser to use your proxy correctly for unencrypted (HTTP) traffic. We personally tested Chrome and found that it uses the
CONNECT
method for HTTPS but not for HTTP.