Even though you have already found this out, I am still going to answer you so it can be referenced by others in case they are curious as well:
To look at the actual header information that occurs this can be done one of two ways fairly easily. Through sniffing the traffic off the network or sending the information through a mode that will not parse the data for you.
sniffing the traffic is done fairly easily with any sort of sniffing program like Ethereal (search for it on sourceforge.net or freshmeat.net). Just set it up to capture data off the network card and then goto the webpage in quesiton. It will pick up all packets sent and they can be viewed in plain text.
the second way (which might seem a bit cleaner, but requires a little more knowledge) would be the basic method like using telnet.
Easy way is to use a telnet program. From inside open up a connection to the website you wish to see the data from. Remember, when connecting to specify port 80 (generally, but sometimes it might be another port) so that you connect to the we server.
Once connected to the web server simply send the request for the http file. This can be done by a simple command like:
GET /index.html
Followed by two new lines. So just type that sort of command in (where the /index.html is the file you wish to request from the server). This is the most basic you can get for a simple HTTP GET request. There are other things you can put on there, so if you are going to sniff traffic, be expected to see a few more (like HTTP version, Client type, Last modified date, etc)
hope this helps others...
|