How to monitor HTTP traffic from the command line on Linux

Last updated on November 24, 2020 by Dan Nanni

Let's say you want to monitor live HTTP web traffic (i.e., HTTP requests and responses) on the wire for some reason. For example, you may be testing experimental features of your web server. Or you may be debugging the communication of a web application or a RESTAPI service. Or you may be trying to troubleshoot PAC (proxy auto config). Or you may want to check for any malware files surreptitiously downloaded from a website. Whatever the reason may be, real-time HTTP traffic monitoring is quite useful for system admins, developers, or even end users.

While packet sniffing tools such as tcpdump are popularly used for live packet dump, you need to set up proper filtering to capture HTTP traffic, and even then, their raw output dump cannot be interpreted on the HTTP protocol level so easily unless you are using GUI tools like Wireshark. Real-time web server log parsers such as ngxtop provide human-readable real-time web traffic traces, but only applicable with a full access to live web server logs.

What will be nice is to have tcpdump-like real-time traffic sniffing tool, but targeting HTTP traffic only, and with human-readable display. In fact, httpry is extactly that: HTTP packet sniffing tool. httpry captures live HTTP packets on the wire, performs HTTP protocol dissection, and displays their content at the HTTP protocol level in a human-readable format. In this tutorial, I will show you how you can monitor HTTP traffic with httpry.

Install httpry on Linux

On Debian-based systems (Ubuntu or Linux Mint), httpry is not available in base repositories. So build it from the source:

$ sudo apt-get install gcc make git libpcap0.8-dev
$ git clone https://github.com/jbittel/httpry.git
$ cd httpry
$ make
$ sudo make install

On Fedora, CentOS or RHEL, you can install httpry with yum as follows. But on CentOS/RHEL, first enable EPEL repo before running yum.

$ sudo yum install httpry

On Red Hat based system, if you still want to build httpry from the source, you can easily do that by:

$ sudo yum install gcc make git libpcap-devel
$ git clone https://github.com/jbittel/httpry.git
$ cd httpry
$ make
$ sudo make install

Basic Usage of httpry

The basic use case of httpry is as follows.

$ sudo httpry -i <network-interface>

httpry then listens on a specified network interface, and displays captured HTTP requests/responses in real time.

In most cases, however, you will be swamped with the fast scrolling output as packets are coming in and out. So you want to save captured HTTP packets for offline analysis. For that, use either -b or -o options. The -b option allows you to save raw HTTP packets into a binary file as is, which then can be replayed with httpry later. On the other hand, -o option saves human-readable output of httpry into a text file.

To save raw HTTP packets into a binary file:

$ sudo httpry -i eth0 -b output.dump

To replay saved HTTP packets:

$ httpry -r output.dump

Note that when you read a dump file with -r option, you don't need root privilege.

To save httpr's output to a text file:

$ sudo httpry -i eth0 -o output.txt

Advanced Usage of httpry

If you want to monitor only specific HTTP methods (e.g., GET, POST, PUT, HEAD, CONNECT, etc), use -m option:

$ sudo httpry -i eth0 -m get,head

If you downloaded httpry's source code, you will notice that the source code comes with a collection of Perl scripts which aid in analyzing httpry's output. These scripts are found in httpry/scripts/plugins directory. If you want to write a custom parser for httpry's output, these scripts can be good examples to start from. Some of their capabilities are:

Before using these scripts, first run httpry with -o option for some time. Once you obtained the output file, run the scripts at once by using this command:

$ cd httpry/scripts
$ perl parse_log.pl -d ./plugins <httpry-output-file>

You may encounter warnings with several plugins. For example, db_dump plugin may fail if you haven't set up a MySQL database with DBI interface. If a plugin fails to initalize, it will automatically be disabled. So you can ingore those warnings.

After parse_log.pl is completed, you will see a number of analysis results (*.txt/xml) in httpry/scripts directory. For example, log_summary.txt looks like the following.

To conclude, httpry can be a life saver if you are in a situation where you need to interpret live HTTP packets. That might not be so common for average Linux users, but it never hurts to be prepared. What do you think of this tool?

Support Xmodulo

This website is made possible by minimal ads and your gracious donation via PayPal or credit card

Please note that this article is published by Xmodulo.com under a Creative Commons Attribution-ShareAlike 3.0 Unported License. If you would like to use the whole or any part of this article, you need to cite this web page at Xmodulo.com as the original source.

Xmodulo © 2021 ‒ AboutWrite for UsFeed ‒ Powered by DigitalOcean