Back to Blog
Capture https traffic wireshark5/16/2023 I don't want all VMs from the host server going through the hub. Sorry if it was not clear but the virtual server is on a host server that is not connected to the hub. ![]() How can we prove that the data that is unmasked and displayed in the users browser has not left the network? We need to prove that the traffic from the application\database server that shows the unmasked data and resolves it in the client's browser is done internally and does not leave the network. Once the client completes the form to request the confidential information this will be unmasked and presented to the client in their web browser. While connected, https calls are made using (JSON, Ajax) (Cross-Origin Resource Sharing (CORS) is an HTTP-header based mechanism that allows a server to indicate any origins (domain, scheme, or port) other than its own from which a browser should permit loading resources.) I am not a web developer, so please excuse if I am not explaining this properly.) The client will complete a form on a page on that website that is expected to display data that is on an application\database server hosted on the internal office network. An external client user will access the website by using the website name: Opens a new window The following provides more detail.Įventually we will have a website hosted externally. ![]() ![]() Right now we are testing this internally only, to confirm no data is leaked before attempting this with an external site. The end objective is to confirm that confidential data does not leave the network when accessing an externally hosted website.
0 Comments
Read More
Leave a Reply. |