Web communication analysis tool [recommended]

Time:2019-12-29

If web communication is divided into many layers from top to bottom — XMLHttpRequest layer, HTTP layer and TCP layer, then these tools can respectively grab the communication data of each layer for analysis, which is extremely powerful in combination.

2008/12/31: in addition, you can refer to Daniel’sCommon tools for web developmentOne article, I believe it will help a lot.

XMLHttpRequest layer: firebug

Scope of application Ajax applications
Advantage Easy to use, complete data capture
shortcoming Only XMLHttpRequest requests can be analyzed, and other types of requests can’t help

FirebugIt should be known to all. Its console can monitor XMLHttpRequest requests, and can see the complete request and response data. It’s the best way to debug Ajax programs.

firebug.png

HTTP layer: tamper data

Scope of application Normal web page, Ajax Application, flash
Advantage Easy to use, wide range of application, any HTTP request can be intercepted
shortcoming Only the request header, request content and response header can be intercepted, and no response content can be obtained; the efficiency is greatly reduced when file download is involved

Tamper DataIt’s a step further than firebug. As long as it’s an HTTP request, it can catch it. Unfortunately, it can’t see the response content. It is applicable to analysis of request process, request parameters, request data and redirect URL. For non Ajax programs such as ordinary web pages, flash, ActiveX and so on, it is very convenient to analyze them with tamper data.

tamperdata.png

HTTP layer: burpsuite

Scope of application Normal web page, Ajax Application, flash
Advantage Wide range of application, complete data interception, no network card selection
shortcoming A little trouble using

burpsuiteThe proxy function in is very useful for analyzing web communication. Its principle is to set up a proxy server, let the browser send the request through the proxy, and the proxy can intercept the data.

burpsuite.png

The usage method is:

  1. Configure proxy, and then set the browser to use its proxy
  2. Visit the page you want to grab
  3. The content of the request will be seen in the proxy of burp suite, where you can analyze the request in detail.
  4. If you want to continue analyzing the response, you can right-click the request content and select send to repeater
  5. Switch to the repeater tab, click the [go] button to send the request, and you can see the response at the bottom

TCP layer: Wireshark

Scope of application Any network program
Advantage Wide range of application, complete interception data
shortcoming Trouble using; cannot use loopback network card

If none of the above works, the ultimate weapon will be offeredwireshark(formerly ethereal). It starts from the bottom of the network, and can intercept any type of network communication, not just HTTP protocol. For example, to develop an e-mail program, you need to analyze the communication between the server-side script and the POP3 server, which requires Wireshark.

wireshark.png

usage method:

  1. Select to grab the physical network card in Wireshark;
  2. Let the application send the request;
  3. Stop grabbing in Wireshark;
  4. Find the request just sent by the application program from the list of caught packets. Right click and select follow TCP stream to see the complete content of the request.

The disadvantage of this tool is that it can’t grab the network card of loopback, that is to say, if your program is connected to a server located at localhost or 127.0.0.1, Wireshark can’t. The solution is to let the program connect to other machines through the real physical network card, or use the virtual network card of the virtual machine.

Recommended Today

asp.net Application of regular expression

1. Balanced group / recursive matching (?’ Group ‘), which is called the corresponding content of group, and counts it on the stack;(?’- Group ‘), and count the corresponding content named group out of the stack(?!) Zero width negative look ahead assertion. Since there is no suffix expression, attempts to match always failRegular example:,{0,1}”5″:\[[^\[\]]*(((?’Open’\[)[^\[\]]*)+((?’-Open’\])[^\[\]]*)+)*(?(Open)(?!))\],{0,1} Test […]