Summary

We looked at HTTP, both in an unencrypted fashion and an encrypted fashion, and how to decrypt it. We also talked about FTP in all of its many flavors: active mode, passive mode, and the encrypted flavors of FTPS and SFTP.

In Chapter 9, Application Protocol Analysis II, we'll continue with some additional application protocols that you will run into.

Get Mastering Wireshark 2 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.