wireshark - Sniff POST variables through HTTPS -


i trying reverse engineer script can submit form using mechanize. form using weird javascript form upload script can't seem understand. thinking sniff traffic going browser server.

first of all, possible? if so, way it? have tried wireshark filter 'http.request.method == "post"', doesn't seem work.

i use http live headers plugin firefox. sample capture http live headers

post /login http/1.1 host: signup.netflix.com user-agent: mozilla/5.0 (windows; u; windows nt 5.1; en-us; rv:1.9.2.16) gecko/20110319 firefox/3.6.16 accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 accept-language: en-us,en;q=0.5 accept-encoding: gzip,deflate accept-charset: iso-8859-1,utf-8;q=0.7,*;q=0.7 keep-alive: 115 connection: keep-alive referer: https://signup.netflix.com/login?country=1&rdirfdc=true --->insert lots of private stuff here content-type: application/x-www-form-urlencoded content-length: 168 authurl=somelongtextstring&nextpage=&submitbutton=true&country=1&email=emailaddress%40somemailprovider.com&password=unencodedpassword 

Comments

Popular posts from this blog

objective c - Change font of selected text in UITextView -

php - Accessing POST data in Facebook cavas app -

c# - Getting control value when switching a view as part of a multiview -