# Get all POST and GET requests using tshark

Hello,

on one of our courses from Information Security I was encouraged to try to analyse my traffic and see what I am able to eavesdrop.

I have found that since my blog is not running securely on SSL (HTTPS), I am literally sending my login credentials to admin interface in "plaintext" inside POST requests (of course).

You can use wireshark to try it yourself. I have immediately set up SSL and since then I am using that instead. Even my web is available on SSL already (you can try it yourself).

Here is a commands I've found useful when using wireshark and tshark (wireshark's command line utility).

Capture all POST and GET requests using tshark on network interface enp1s0 and save it to the file ~/out.ncap (can be read by wireshark later):

tshark -i enp1s0 -f'port 80 and (tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504F5354 or tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420)' -w ~/out.ncap