Do wireshark experiments and write https experiment report assignments on your behalf


Experiment 2 HTTP protocol working process
1. Experiment purpose
1. Understand the working process of HTTP protocol
2. Master the content of request message and response message
3. Master Session, Cookie and other technologies in HTTP protocol

2. Experimental equipment/experimental environment
1. Install the client with wireshark and Browser (required);
2. Install and configure the server with WEB service (required);
3. Install and configure the WEB development environment (required);
4 . , At least the local area network built by the switch, if there is no available WMWare virtual environment to replace;

3. Experimental Principle
HTTP and HyperText Transfer Protocol (HyperText Transfer Protocol) are the most widely used network protocols on the Internet. Provides a way to publish and receive HTML pages, and all WEB services currently follow this protocol.
HTTP is a client-side and server-side request and response standard (TCP). The client is the end user and the server is the website. Using a web browser, web crawler, or other tool, the client initiates an HTTP request to the server on the specified port (the default port is 80). (We call this client) a user agent. The responding server provides resources, such as HTML files and images, and applications. The answering server is the origin server.
Usually HTTP messages include request messages from the client to the server and response messages from the server to the client.
The request message contains: GET /somedir/page.html HTTP/1.1
GET / POST method
Host: website server address
User-agent: user browser agent. Contains information such as the client's browser, operating system version, etc.
Connection: close Provides a sustainable connection or an unsustainable connection.
The response message includes HTTP/1.1 200 OK
Connection close Whether the connection is continuous or not
Date: Response time
Server: Apache/3.3.2 (Unix) Server information and website container information
4. Experimental content
1. Use wireshark to capture application layer HTTP protocol PDU
2. Analyze the process and encapsulation of HTTP protocol
3. Develop a response web page that returns different data according to different client devices and different browsers

5. Experimental steps
1. Open wireshark, select the network card that is surfing the Internet, and start capture
2. The client socket interface sends an access request
3. Stop capturing, and analyze the process and content
4. Use Spliter to filter out http accesses Request, respond to requests and web page data packets, analyze the header of the data packet encapsulation
5. Use JSP to write a web page, and feed back different client data according to different clients

6. Experiment Notes
1. The capture of wireshark should be aimed at the network card connected to the Internet.
2. Correctly use the filter statement to filter accordingly (ip.src == XXXX && http)
3. The JSP website should be published on the local area network and must be accessed through other clients

7. Questions or assignments
Why must the client operating system type and client type be declared in the client access request?
Why is there WWW container information in the server response message and what impact does this have on network security
http://www.6daixie.com/contents/19/1303.html

 

The core members of the team mainly include Silicon Valley engineers, BAT front-line engineers, top 5 master and doctoral students in China, and are proficient in German and English! Our main business scope is to do programming assignments, course design and so on.

 

Our field of direction: window programming, numerical algorithm, AI, artificial intelligence, financial statistics, econometric analysis, big data, network programming, WEB programming, communication programming, game programming, multimedia linux, plug-in programming program, API, image processing, embedded/MCU database programming, console process and thread, network security, assembly language hardware Programming software design engineering standards and regulations. The ghostwriting and ghostwriting programming languages ​​or tools include but are not limited to the following:

C/C++/C# ghostwriting

Java ghostwriting

IT ghostwriting

Python ghostwriting

Tutored programming assignments

Matlab ghostwriting

Haskell ghostwriting

Processing ghostwriting

Building a Linux environment

Rust ghostwriting

Data Structure Assginment

MIPS ghostwriting

Machine Learning homework ghostwriting

Oracle/SQL/PostgreSQL/Pig database ghostwriting/doing/coaching

web development, website development, website work

ASP.NET website development

Finance Insurance Statistics Statistics, Regression, Iteration

Prolog ghostwriting

Computer Computational method

 

Because professional, so trustworthy. If necessary, please add QQ: 99515681 or email: [email protected]

WeChat: codinghelp

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=324745445&siteId=291194637