Ever since Google started using HTTPS as a ranking signal in the hopes of making the Internet safer, you can find more and more websites and online services starting to use HTTPS. HTTPS is safe in the sense that when you visit a website that uses the secure HTTPS protocol instead of HTTP, anyone such as your Internet Service Provider or network administrator that runs a packet sniffer on the network level cannot see what exactly you are doing.
Visiting a website that uses HTTPS on all pages is definitely good but there is a small problem whereby you won’t be able to obtain the direct download links from a web installer that downloads from a HTTPS URL. An example is 2 years ago you were able to use URLSnooper, HTTPNetworkSniffer, Free HTTP Sniffer, Socket Sniffer or PacketViewer to display the hidden remote URL for Adobe Flash Player Installer but these tools no longer work because the installer downloads from an encrypted HTTPS source, rather than HTTP.

As you can see from the screenshot above, NetLimiter shows that the Adobe Download Manager connects to port 443 which is used for the encrypted HTTPS protocol (HTTP uses port 80). In this article we’ll show you some tools that can decrypt the encrypted HTTPS traffic so that you get the same level of details as HTTP.
(more…)


