Request type | Output |
---|---|
For HTTP traffic the IP and full request is shown | 104.131.8.184 http://catfact.ninja/fact |
For HTTPS traffic using sni, the IP and domain is shown | 104.131.8.184 catfact.ninja |
HTTP Request on nonstandard support wit no extra config | 35.180.139.74 http://portquiz.net:8080/ |
If an HTTPS conneciton is made without sni then only the IP is shown | 35.180.139.74 |
All output is also time stamped.
Update the command with the source IP so it can filter only outbound.
tshark -i eth0 -Tfields -e frame.time -e ip.dst -e ssl.handshake.extensions_server_name -e http.request.full_uri -Y '(ssl.handshake.extension.type == 0) or (http.request.full_uri)'
tshark -i wlp1s0 -Tfields -e frame.time -e tls.handshake.extensions_server_name -e http.request.full_uri -Y '(tls.handshake.extension.type == 0) or (http.request.full_uri)'