HTTP is an application layer protocol used in WWW. HTTP enables communications between the HTTP client and HTTP server. Example traffic is shown in the following screenshot. An HTTP GET request is created by the client (browser or cURL), and the HTTP server has responded with the appropriate content type:

Use http to display HTTP packets only. Use TCP port 80 to filter for HTTP traffic only; port 80 is the default HTTP port.
The following example shows different use cases where Wireshark can help to analyze HTTP packets.
Open the file
http_01.pcap in the Wireshark, and find the top HTTP response time for the request HTTP get:
http filter and add http.time as a column from the http.response.code == 200 HTTP OK packet.
Use Wireshark's http.request.method to display packets for analysis. For example, the following table describes how to apply this filter:
If the form contains sensitive information such as password, Wireshark can easily reveal it as HTTP is an unsecure means of transferring data over the network.
Open the HTTP_FORM_POST.pcap file and filter the traffic to display only the request method POST and locate the password form item, as shown in the following screenshot:

The first line of the HTTP response contains the status code. Use the Wireshark filter http.response.code, to display packets based on the status code. This will be helpful when debugging the HTTP client-server interaction:
|
Type |
Code |
Meaning |
HTTP Wireshark filter |
|---|---|---|---|
|
Informational – 1xx |
100 |
Continue |
|
|
101 |
Switching protocol |
| |
|
Successful – 2xx From: 200 To: 206 |
200 |
OK |
|
|
201 |
Created |
| |
|
Redirection – 3xx From: 300 To: 307 |
300 |
Multiple choices |
|
|
301 |
Moved permanently |
| |
|
Client Error – 4xx From: 400 To: 417 |
400 |
Bad Request |
|
|
401 |
Unauthorized |
| |
|
Server Error – 5xx From—500 To-- 505 |
500 |
Internal Server Error |
|
|
501 |
Not implemented |
|