The main goal of this lab is to understand how HTTP (Hypertext Transfer Protocol) enables communication between a web client (like a browser) and a server. By analyzing HTTP packets with Wireshark, you can:
-
Examine HTTP request and response headers to see what information is sent and received.
-
Understand the mechanics of web communication.
-
Detect potential HTTP-based attacks or data leaks, helping improve web security.
In short, it’s about learning how web traffic works and spotting security issues using packet analysis.
HTTP Request Header: once a TCP handshake and TL SSL handshake is done, the bowser chrome or edge sends a request to for example google.com which is HTTP get message.
-
GET: Requests a resource from the server.
-
POST: Sends data to the server (e.g., forms, login info).
-
DELETE: Removes a resource on the server.

If the server is readz to talk, we will a response code. A response code for example 200 which means it is perfect


The HTTP request header is a part of the HTTP request sent by a client (like a browser) to a server. It contains metadata about the request and instructions for the server on how to handle it. Key points:
-
Request Method: Specifies the type of request, e.g., GET to retrieve a resource, POST to send data.
-
Host: Indicates the server’s domain name (e.g., google.com) that the client wants to communicate with.
-
User-Agent: Identifies the client software, such as the browser type and version (e.g., Chrome, Edge).
-
Other Headers: Can include cookies, accepted content types, language preferences, etc.
When you open your browser’s Developer Tools → Network tab → click on a request, you can see:
-
The request method (GET, POST, etc.)
-
The status code (like 200, which is part of the response, not the request)
-
All headers sent by the browser in that request.

After opening the Host machine web browser, I can see request headers as show below:

All HTTP traffics in wireshark as at the time of the lab show below:

tcp.port == 80 to show the default ports

http.request.method == "GET"

http.request.uri

http.set_cookie

ip.addr == 192.168.1.22

- HTTP traffic is readable and easy to analyze in Wireshark.
- Analyzing HTTP helps detect:
- Sensitive data exposure in URLs or headers
- Malware beaconing to C2 servers
- Suspicious file downloads or unauthorized access.