wireshark - Sniff POST variables through HTTPS -
i trying reverse engineer script can submit form using mechanize. form using weird javascript form upload script can't seem understand. thinking sniff traffic going browser server.
first of all, possible? if so, way it? have tried wireshark filter 'http.request.method == "post"', doesn't seem work.
i use http live headers plugin firefox. sample capture http live headers
post /login http/1.1 host: signup.netflix.com user-agent: mozilla/5.0 (windows; u; windows nt 5.1; en-us; rv:1.9.2.16) gecko/20110319 firefox/3.6.16 accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 accept-language: en-us,en;q=0.5 accept-encoding: gzip,deflate accept-charset: iso-8859-1,utf-8;q=0.7,*;q=0.7 keep-alive: 115 connection: keep-alive referer: https://signup.netflix.com/login?country=1&rdirfdc=true --->insert lots of private stuff here content-type: application/x-www-form-urlencoded content-length: 168 authurl=somelongtextstring&nextpage=&submitbutton=true&country=1&email=emailaddress%40somemailprovider.com&password=unencodedpassword
Comments
Post a Comment