如何分析 HTTP 转储?
我有一个文件,显然包含某种保持活动的 HTTP 对话的转储,即多个 GET 请求和响应,包括标头,包含 HTML 页面和一些图像。 然而,中间有一些二进制垃圾 - 也许是 TCP 甚至 IP 级别的转储(我不知道如何确定它是什么)。
基本上,我需要提取传输的文件。 有没有我可以使用的免费工具?
I have a file that apparently contains some sort of dump of a keep-alive HTTP conversation, i.e. multiple GET requests and responses including headers, containing an HTML page and some images. However, there is some binary junk in between - maybe it's a dump on the TCP or even IP level (I'm not sure how to determine what it is).
Basically, I need to extract the files that were transferred. Are there any free tools I could use for this?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(3)
使用 Wireshark。
查看其转储的文件格式并将转储转换为该格式。 非常简单。 它称为 pcap 文件格式。 然后你可以在Wireshark中打开它,没有问题,它应该能够识别内容。 Wireshark 支持各种 OSI 层(包括 TCP/IP/HTTP)的数十种甚至数百种通信格式,非常适合此类调试。
Use Wireshark.
Look into the file format for its dumps and convert your dump to it. Its very simple. Its called the pcap file format. Then you can open it in Wireshark no problem and it should be able to recognize the contents. Wireshark supports many dozens if not many hundred communication formats at various OSI layers (including TCP/IP/HTTP) and is great for this kind of debugging.
Wireshark 将在数据包级别进行分析。 如果你想在协议层面进行分析,我推荐Fiddler: http://www.fiddlertool.com/fiddler /
它将向您显示发送的标头、响应,并且还将解密 HTTPS 会话。 还有很多。
Wireshark will analyze on the packet level. If you want to analyze on the protocol level, I recommend Fiddler: http://www.fiddlertool.com/fiddler/
It will show you the headers sent, the responses, and will decrypt HTTPS sessions as well. And a ton more.
Firefox 的 Firebug 插件中的“网络”选项卡可能有用。
The Net tab in the Firebug plugin for Firefox might be of use.