Summary
We looked at HTTP, both in an unencrypted fashion and an encrypted fashion, and how to decrypt it. We also talked about FTP in all of its many flavors: active mode, passive mode, and the encrypted flavors of FTPS and SFTP.
In Chapter 9, Application Protocol Analysis II, we'll continue with some additional application protocols that you will run into.