SlideShare a Scribd company logo
1 of 16
Agenda                              By Eric Lawrence



                                                       SBR Department

        What is fiddler , how does it
         work
        Fiddler Features
        Alternative tools




                                                                    © 2008 Amadeus IT Group SA
1
Who uses Fiddler?

       Support teams
       Web Developers
       Testers
       Hackers




                         © 2008 Amadeus IT Group SA
2
What fiddler do?

       HTTP/HTTPS traffic monitoring and analysis
       Request and response modification
       Timing and network manipulation
       Runs as a proxy server on the local machine or on a
        remote server




                                                              © 2008 Amadeus IT Group SA
3
How does fiddler works?

                                              Firewall

     Firefox




    CryptoAPI   WinHTTP



     Internet                       CorpNET
                WinINET   Fiddler                        example.com
     Explorer                        Proxy



      Office




                                                                       © 2008 Amadeus IT Group SA
4
Debugging non-Windows clients




                 Fiddler      Internet




                                         © 2008 Amadeus IT Group SA
5
6
                                 Fiddler 1.0 in 2003




    © 2008 Amadeus IT Group SA
7
                                 Before Fiddler




    © 2008 Amadeus IT Group SA
8
                                 Fiddler 2.0




    © 2008 Amadeus IT Group SA
Getting to know Fiddler


    Demo

    A quick tour of the Fiddler UI




                                     © 2008 Amadeus IT Group SA
9
Continued …

        Statistics
        Inspectors
        Auto Responder
        Request Builder
        Expert Analysis with neXpert
        Filters
        Logs
        Timeline




                                        © 2008 Amadeus IT Group SA
        Text Encode/Decode editor
        Custom rules

10
Continued…

        SAZ ( Session archive zip )




                                       © 2008 Amadeus IT Group SA
11
Resources
       http://www.fiddler2.com




                                              © 2008 Amadeus IT Group SA
     http://www.fiddler2.com/book/

      http://www.microsoftpdc.com/2009/CL25
      http://www.ericlawrence.com/




12
13
                                  Support




     © 2008 Amadeus IT Group SA
Alternatives and similar tools

        Packet Analyzers
             WireShark
            NetMon
        Proxies
             Charles Proxy
           Burb Suit
        Browser Dev tools
             Firebug, HttpFox
             Chrome Dev tools




                                      © 2008 Amadeus IT Group SA
             IE Dev tools
             Opera DragonFly




14
Quick Summary( Commonly Used
     Features)
        Web Sessions
        Inspectors
        Auto Responders
        Filters
        Work Offline( SAZ )
        Rules




                                    © 2008 Amadeus IT Group SA
15
That's All.
     Thank you!
     Any questions?




                      © 2008 Amadeus IT Group SA
16

More Related Content

What's hot

Cisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseCisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterprise
IT Tech
 

What's hot (19)

Cisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterpriseCisco asa5540, best guard for enterprise
Cisco asa5540, best guard for enterprise
 
PuppetConf 2016: Application Centric Automation with Puppet & Cisco – Farid J...
PuppetConf 2016: Application Centric Automation with Puppet & Cisco – Farid J...PuppetConf 2016: Application Centric Automation with Puppet & Cisco – Farid J...
PuppetConf 2016: Application Centric Automation with Puppet & Cisco – Farid J...
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotely
 
Best Practices: How to Work Remotely
Best Practices: How to Work RemotelyBest Practices: How to Work Remotely
Best Practices: How to Work Remotely
 
Flash card Module 9- Manage Security Operation in Azure
Flash card  Module 9- Manage Security Operation in AzureFlash card  Module 9- Manage Security Operation in Azure
Flash card Module 9- Manage Security Operation in Azure
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Ole Trøan - State of the Norwegian IPv6 Nation
Ole Trøan - State of the Norwegian IPv6 NationOle Trøan - State of the Norwegian IPv6 Nation
Ole Trøan - State of the Norwegian IPv6 Nation
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
How to Effectively Manage Virtual Teams
How to Effectively Manage Virtual TeamsHow to Effectively Manage Virtual Teams
How to Effectively Manage Virtual Teams
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
 

Similar to Fiddler

Presentation Personall
Presentation PersonallPresentation Personall
Presentation Personall
Personall SAS
 
Basicsofembeddedsytsems 110519071747-phpapp02
Basicsofembeddedsytsems 110519071747-phpapp02Basicsofembeddedsytsems 110519071747-phpapp02
Basicsofembeddedsytsems 110519071747-phpapp02
priya_makhija
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
Prakhar Sood
 

Similar to Fiddler (20)

Intel® Network Builders - Network Edge Ecosystem Program
Intel® Network Builders - Network Edge Ecosystem ProgramIntel® Network Builders - Network Edge Ecosystem Program
Intel® Network Builders - Network Edge Ecosystem Program
 
Sierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open ATSierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open AT
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Cold Fusion Deck
Cold Fusion DeckCold Fusion Deck
Cold Fusion Deck
 
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data AnalyticsMotadata - Unified Product Suite for IT Operations and Big Data Analytics
Motadata - Unified Product Suite for IT Operations and Big Data Analytics
 
Gadgeon profile
Gadgeon profileGadgeon profile
Gadgeon profile
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud Economics
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 
The Art of Managing and Securing Endpoints
The Art of Managing and Securing EndpointsThe Art of Managing and Securing Endpoints
The Art of Managing and Securing Endpoints
 
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
Blue Medora IBM Tivoli Monitoring (ITM) Agent for IBM Tivoli Directory Server...
 
The Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints with SanerNow Patch ManagementThe Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints with SanerNow Patch Management
 
Presentation Presentation Personall Knowledge Networks
Presentation Presentation  Personall Knowledge NetworksPresentation Presentation  Personall Knowledge Networks
Presentation Presentation Personall Knowledge Networks
 
Hotels multisource registration DOTW
Hotels multisource registration DOTWHotels multisource registration DOTW
Hotels multisource registration DOTW
 
What are latest new features that DPDK brings into 2018?
What are latest new features that DPDK brings into 2018?What are latest new features that DPDK brings into 2018?
What are latest new features that DPDK brings into 2018?
 
Presentation Personall
Presentation PersonallPresentation Personall
Presentation Personall
 
Basicsofembeddedsytsems 110519071747-phpapp02
Basicsofembeddedsytsems 110519071747-phpapp02Basicsofembeddedsytsems 110519071747-phpapp02
Basicsofembeddedsytsems 110519071747-phpapp02
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
 
System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine ManagerSystem Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine Manager
 
Spotfire
SpotfireSpotfire
Spotfire
 
Presentation sg v77
Presentation sg v77Presentation sg v77
Presentation sg v77
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

Fiddler

  • 1. Agenda By Eric Lawrence SBR Department  What is fiddler , how does it work  Fiddler Features  Alternative tools © 2008 Amadeus IT Group SA 1
  • 2. Who uses Fiddler?  Support teams  Web Developers  Testers  Hackers © 2008 Amadeus IT Group SA 2
  • 3. What fiddler do?  HTTP/HTTPS traffic monitoring and analysis  Request and response modification  Timing and network manipulation  Runs as a proxy server on the local machine or on a remote server © 2008 Amadeus IT Group SA 3
  • 4. How does fiddler works? Firewall Firefox CryptoAPI WinHTTP Internet CorpNET WinINET Fiddler example.com Explorer Proxy Office © 2008 Amadeus IT Group SA 4
  • 5. Debugging non-Windows clients Fiddler Internet © 2008 Amadeus IT Group SA 5
  • 6. 6 Fiddler 1.0 in 2003 © 2008 Amadeus IT Group SA
  • 7. 7 Before Fiddler © 2008 Amadeus IT Group SA
  • 8. 8 Fiddler 2.0 © 2008 Amadeus IT Group SA
  • 9. Getting to know Fiddler Demo A quick tour of the Fiddler UI © 2008 Amadeus IT Group SA 9
  • 10. Continued …  Statistics  Inspectors  Auto Responder  Request Builder  Expert Analysis with neXpert  Filters  Logs  Timeline © 2008 Amadeus IT Group SA  Text Encode/Decode editor  Custom rules 10
  • 11. Continued…  SAZ ( Session archive zip ) © 2008 Amadeus IT Group SA 11
  • 12. Resources http://www.fiddler2.com © 2008 Amadeus IT Group SA http://www.fiddler2.com/book/ http://www.microsoftpdc.com/2009/CL25 http://www.ericlawrence.com/ 12
  • 13. 13 Support © 2008 Amadeus IT Group SA
  • 14. Alternatives and similar tools  Packet Analyzers  WireShark  NetMon  Proxies  Charles Proxy  Burb Suit  Browser Dev tools  Firebug, HttpFox  Chrome Dev tools © 2008 Amadeus IT Group SA  IE Dev tools  Opera DragonFly 14
  • 15. Quick Summary( Commonly Used Features)  Web Sessions  Inspectors  Auto Responders  Filters  Work Offline( SAZ )  Rules © 2008 Amadeus IT Group SA 15
  • 16. That's All. Thank you! Any questions? © 2008 Amadeus IT Group SA 16