HAR Files Explained: Capturing Network Evidence for Legal Cases
Published April 3, 2026
A screenshot shows what a web page looked like. But it tells you nothing about what was happening behind the scenes - which servers the browser contacted, what data was sent back, or what invisible trackers were firing in the background.
That hidden network activity is often the most important evidence. A website that loads malware does so through specific network requests. A tracking pixel that violates a privacy policy fires as an HTTP call. An embedded image that infringes a copyright is pulled from a particular URL. None of this shows up in a screenshot.
This is where HAR files come in. A HAR file is a complete log of every network request the browser made while loading a page. It is the network-level equivalent of a black box recorder, and it is becoming an essential part of any serious digital evidence package.
What is a HAR File?
HAR stands for HTTP Archive. It is a JSON-based file format that records every HTTP transaction between a browser and the servers it communicates with. The format was created by Jan Odvarko and has been adopted as a W3C standardused by every major browser's developer tools.
When you open the Network tab in Chrome, Firefox, or Edge and watch requests flow by as a page loads, you are looking at the same data that a HAR file captures. The difference is that a HAR file saves all of it to disk in a structured, machine-readable format that can be analyzed, searched, and presented as evidence.
A typical web page makes anywhere from 30 to 300 network requests during a single page load. Each request is a conversation between the browser and a server. The HAR file records both sides of every conversation.
What Information Does a HAR File Capture?
A HAR file is remarkably detailed. For every network request, it records:
- Request URL - the full address of every resource the browser fetched, including query parameters and fragments
- HTTP method - whether the request was a GET, POST, PUT, or other method, revealing how the browser interacted with the server
- Request and response headers - cookies, content types, caching directives, authentication tokens, server identifiers, and more
- HTTP status codes - whether the server returned a 200 (success), 301 (redirect), 403 (forbidden), 500 (server error), or any other status
- Response body sizes - the exact size of every downloaded resource, useful for proving what content was actually delivered
- Timing data - DNS lookup time, connection time, TLS handshake duration, time to first byte, and download time for every single request
- MIME types - the declared content type of every response, showing whether a resource was HTML, JavaScript, an image, a font, or something else entirely
- Redirects - the complete chain of redirects from the initial URL to the final destination, including every intermediate step
All of this is stored in clean, structured JSON. It can be parsed by scripts, loaded into analysis tools, or read directly by anyone with a text editor. There is no proprietary format to decode and no special software required.
Why HAR Files Matter for Legal Evidence
Screenshots and HTML captures preserve what a user sees. HAR files preserve what a page actually does. That distinction matters in several categories of legal disputes.
Proving what resources loaded
A HAR file is definitive proof of which servers a page contacted and what content they returned. If a website claims it does not load third-party scripts, the HAR file will show whether that is true. If a page serves different content to different users, the HAR file documents exactly what was served in that specific session.
Documenting server responses
HTTP status codes and response headers tell a story that visual captures cannot. A 301 redirect chain shows that a domain was intentionally pointing to infringing content. A 200 response from a malware distribution server proves the payload was delivered successfully. A server header revealing specific software versions can establish timelines and technical responsibility.
Exposing hidden tracking and data collection
Privacy litigation increasingly hinges on what data websites collect without user consent. HAR files expose every tracking pixel, every analytics beacon, and every cross-domain request that fires when a page loads. If a website claims compliance with GDPR or CCPA but silently loads Facebook Pixel, Google Analytics, and a dozen ad network scripts before the user has interacted with any consent banner, the HAR file is the evidence that proves it.
Real-World Use Cases
HAR file evidence is relevant across a wide range of legal and investigative scenarios:
Malware distribution
When a compromised or malicious website distributes malware, the HAR file captures the exact request chain - from the initial page load through any redirects to the final malware payload URL. It records the server that hosted the malicious file, the content type it declared, and the response code it returned. This level of detail is essential for takedown requests, law enforcement reports, and civil litigation against the operators.
Tracking pixel and consent violations
Regulatory enforcement around cookie consent and tracking is accelerating. A HAR file from a single page load can prove that a website fired tracking scripts before displaying a consent banner, that it loaded third-party cookies despite a "no cookies" policy, or that it transmitted user data to advertising networks without consent. This evidence is concrete, timestamped, and difficult to dispute.
Copyright infringement via embedded content
Many copyright disputes involve content embedded from external sources - hotlinked images, embedded videos, or iframed pages. A screenshot shows that the content appeared on the page, but a HAR file proves exactly where it was loaded from. It captures the source URL, the referrer header, and the response that delivered the infringing content. This makes it clear whether the content was hosted locally, hotlinked from the original source, or served through a CDN.
Ad fraud and click injection
In advertising disputes, HAR files can document the exact sequence of ad network requests, impression tracking calls, and click redirect chains. They reveal whether ads were actually displayed, whether click events were legitimate, and which parties in the ad supply chain handled each request.
How Snapoena Captures HAR Data Automatically
Manually exporting a HAR file from browser developer tools is straightforward if you are a developer. For everyone else, it is an extra step that is easy to forget and easy to get wrong.
The Snapoena Chrome extension eliminates this problem by capturing HAR data automatically as part of every evidence package. When you click the capture button, the extension uses the browser's Performance API and network request interception to record every HTTP transaction that occurs during the page load. No developer tools required. No manual export step.
The resulting HAR data is included in your evidence bundle alongside the screenshot, HTML source, MHTML archive, and metadata. Every network request is logged with its full URL, headers, status code, timing, and response size. The data is structured and ready for analysis or presentation.
Because the extension captures from your actual browser session, it records the real network activity for pages that require authentication - not what a server-side tool would see when requesting the page without cookies or session tokens.
HAR Files and the Evidence Strength Score
Snapoena assigns every capture an evidence strength score from 0 to 100 based on the completeness of the evidence package. Including HAR data contributes to that score because it adds a dimension of evidence - network activity - that no other capture format provides.
A screenshot proves visual appearance. An MHTML archive preserves page structure. HTML source captures the DOM. But only a HAR file proves what the browser actually communicated over the network. Together, these layers create an evidence package that covers visual, structural, and behavioral aspects of the page.
The Bottom Line
Web pages are not just what they look like. They are also what they do - the servers they contact, the data they send, the trackers they fire, and the resources they load. A HAR file captures all of this activity in a structured, verifiable format that screenshots and page archives simply cannot replicate.
If your evidence needs to show not just what a page displayed but what it did behind the scenes, HAR files are not optional. They are essential.
Capture complete network evidence
The Snapoena Chrome extension captures HAR data, screenshots, MHTML archives, and metadata in one click. Build evidence packages that cover every layer of a web page.
Get Started Free