The HTTP Objects analysis tool can be used to extract and preview or save the original files transferred via HTTP and captured within the tracefile. These could be images, scripts, audio files, applications, really anything.
Access to the HTTP Object Analysis tool is found by clicking the button on the HTTP Analysis popup dialog box.
From within this tool, you can filter on a specific content-type or host, drill into the exact frame the response was contained in, follow-stream, or even preview certain types of content.
In-Browser object previews are enabled by default. The admin can disable extraction of all HTTP objects by changing this settings within CloudShark.
If an object is an image, audio, or video, CloudShark will attempt to preview it directly in the browser using a native content tag. Support for various types of audio and video will be browser dependent.
If the object in question can be displayed as text, the raw text will be previewed by CloudShark. If there is no preview available (as is the case for binary content-types) the file will simply be presented as a download link.
Please note that CloudShark does not scan any content for viruses, malware, or other hazardous types.