wireshark

How to throttle network traffic for environment simulation?

☆樱花仙子☆ 提交于 2019-12-18 20:14:40
问题 I'm trying to test an application that uses a database connection. What I would like to do is throttling the bandwith to, say, 1 MBit or such to get a better feeling for the application under realistic conditions. I already use Wireshark to have a look at the communication with the DB and I expected Wireshark to have a feature like that but as it seems there is no way to do something like that. Any suggestions? 回答1: Check out WANem. You can download a bootable ISO that you boot up on any

网络对抗技术 实验二

无人久伴 提交于 2019-12-18 18:04:11
中国人民公安大学 Chinese people ’ public security university 网络对抗技术 实验报告 实验二 网络嗅探与欺骗 学生姓名 刘畅 年级 2015级 区队 四区队 指导教师 高见 信息技术与网络安全 学院 2018 年9 月25 日 实验任务总纲 20 18 —20 19 学年 第 一 学期 一、实验目的 1.加深并消化本课程授课内容,复习所学过的互联网搜索技巧、方法和技术; 2.了解并熟悉常用的网络嗅探方式,掌握常用抓包软件的使用方法和过滤技巧,能够对给定的数据包分析网络基本行为;掌握ARP欺骗的基本原理,以及基于ARP欺骗的DNS攻击方式; 3.达到巩固课程知识和实际应用的目的。 二、实验要求 1.认真阅读每个实验内容,需要截图的题目,需清晰截图并对截图进行标注和说明。 2.文档要求结构清晰,图文表达准确,标注规范。推理内容客观、合理、逻辑性强。 3.软件工具可使用office2003或2007、CAIN、Wireshark等。 4.实验结束后,保留电子文档。 三 、实验步骤 1.准备 提前做好实验准备,实验前应把详细了解实验目的、实验要求和实验内容,熟悉并准备好实验用的软件工具,按照实验内容和要求提前做好实验内容的准备。 2.实验环境 描述实验所使用的硬件和软件环境(包括各种软件工具); 开机并启动软件office2003或2007

How can I decode SQL Server traffic with wireshark?

非 Y 不嫁゛ 提交于 2019-12-18 12:50:40
问题 I can capture the packets using wireshark, but I can't decode the stream into anything intelligible. This bug suggests that maybe this isn't possible in SQL Server 2005 or newer... https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3098, but several people on Stack Overflow claimed this was a good method in answers to this question: How to SQL Server traffic is encrypted?. Any help appreciated. 回答1: Edit (2017-05-02): Microsoft Network Monitor - has been replaced by Microsoft Message

GCDAsyncUdpSocket on iOS missing multicasted datagrams

老子叫甜甜 提交于 2019-12-18 11:44:34
问题 I have a device on the network that is multicasting a very small file via UDP. The iOS app I am developing is responsible for reading these packets and I have chosen to use GCDAsyncUdpSocket to do so. The file is sent every half second, however I am not receiving it nearly that often (only receiving about every 3-10 seconds). Thinking that it may be an issue with the device, I began monitoring the traffic with Wireshark. This appeared to reflect what I was seeing in my app until I enabled

TCP协议的定义和丢包时的重传机制

感情迁移 提交于 2019-12-18 10:42:35
【推荐】2019 Java 开发者跳槽指南.pdf(吐血整理) >>> TCP是一个巨复杂的协议,因为他要解决很多问题,而这些问题又带出了很多子问题和阴暗面。所以学习TCP本身是个比较痛苦的过程,但对于学习的过程却能让人有很多收获。关于TCP这个协议的细节,我还是推荐你去看 W.Richard Stevens 的《 TCP/IP 详解 卷1:协议 》(当然,你也可以去读一下 RFC793 以及后面N多的RFC)。另外,本文我会使用英文术语,这样方便你通过这些英文关键词来查找相关的技术文档。 复杂的TCP 之所以想写这篇文章,目的有三个, 一个是想锻炼一下自己是否可以用简单的篇幅把这么复杂的TCP协议描清楚的能力。 另一个是觉得现在的好多程序员基本上不会认认真真地读本书,喜欢快餐文化,所以,希望这篇快餐文章可以让你对TCP这个古典技术有所了解,并能体会到软件设计中的种种难处。并且你可以从中有一些软件设计上的收获。 最重要的希望这些基础知识可以让你搞清很多以前一些似是而非的东西,并且你能意识到基础的重要。 所以,本文不会面面俱到,只是对TCP协议、算法和原理的科普。 我本来只想写一个篇幅的文章的,但是TCP真TMD的复杂,比C++复杂多了,这30多年来,各种优化变种争论和修改。所以,写着写着就发现只有砍成两篇。 上篇中,主要向你介绍TCP协议的定义和丢包时的重传机制 下篇中

Read nanosecond pcap file using libpcap

房东的猫 提交于 2019-12-18 06:14:18
问题 I have a nanosecond libpcap (nanosec.pcap) file and the nanosecond timestamp (eg 2.123456789) can be displayed by using Wireshark. Now i would like to open the nanosecond libpcap file using C language and have the source code as following. When I try to open the the nanosec.pcap by using pcap_open_offine(), it would return "unknown file format" error. Additionally, by changing the magic number at the header of nanosec.pcap to that of normal pcap (0x1A2B3C4D) and I got a segmentation fault

Read nanosecond pcap file using libpcap

我的梦境 提交于 2019-12-18 06:14:01
问题 I have a nanosecond libpcap (nanosec.pcap) file and the nanosecond timestamp (eg 2.123456789) can be displayed by using Wireshark. Now i would like to open the nanosecond libpcap file using C language and have the source code as following. When I try to open the the nanosec.pcap by using pcap_open_offine(), it would return "unknown file format" error. Additionally, by changing the magic number at the header of nanosec.pcap to that of normal pcap (0x1A2B3C4D) and I got a segmentation fault

How do I filter SQL Server traffic between app and DB servers using Wireshark?

大憨熊 提交于 2019-12-18 04:03:29
问题 I'm trying to identify the source of some ill-timed connection resets. I'm trying to use Wireshark to capture the traffic that goes between the application server and database server. How do I set up a filter for this in Wireshark? 回答1: Wireshark has display filters and capture filters. The capture filter captures only certain packets, resulting in a small capture file. Capture filters are set in Capture Options (ctrl-K). An example to capture SQL Server traffic would be: host <sql-server-ip>

How do I filter SQL Server traffic between app and DB servers using Wireshark?

爱⌒轻易说出口 提交于 2019-12-18 04:03:06
问题 I'm trying to identify the source of some ill-timed connection resets. I'm trying to use Wireshark to capture the traffic that goes between the application server and database server. How do I set up a filter for this in Wireshark? 回答1: Wireshark has display filters and capture filters. The capture filter captures only certain packets, resulting in a small capture file. Capture filters are set in Capture Options (ctrl-K). An example to capture SQL Server traffic would be: host <sql-server-ip>

Wireshark捕获过滤器和显示过滤器

我与影子孤独终老i 提交于 2019-12-18 01:47:07
wireshark过滤器分为两种,显示过滤器和捕获过滤器。显示过滤器指的是针对已经捕获的报文,使用过滤器语法过滤出符合规则的报文。捕获过滤器指的是提前设置好过滤规则,只捕获符合过滤规则的报文。显示过滤器和捕获过滤器在报文分析的过程中经常使用到,因此非常的实用。往往初次接触wireshark,可能会分不清这两种过滤规则,本文就先简单介绍一下这两种过滤器。 为什么wireshark使用两套过滤器规则呢?原因在于wireshark使用winpcap或者libpcap第三方的报文捕获库来对网卡的报文进行捕获,事实上其他很多软件都有使用libpcap进行报文捕获。因此捕获过滤器就沿用了这些第三方库提供的捕获过滤规则。但是对于已经捕获报文的解析和处理,wireshark本身构建了一套新的过滤规则,即显示过滤器,要更加的复杂和强大。 为什么要使用捕获过滤器呢?因为在有些场景下,网卡上的流量可能很大,每秒几个G很甚至更多。而很多的流量并不是我们关心的数据,这个时候就需要使用捕获过滤器捕获指定的数据。无用的数据一方面会干扰分析,另一方面浪费存储空间以及拷贝时间。 图1就是wireshark捕获->选项中设置捕获过滤器的地方: 图1 我在图中设置了主机的IP地址以及端口两个过滤规则,表示捕获地址为192.168.0.115同时端口为53的报文,从直观上来说是很容易理解的