wireshark

并行4bit计算CRC32的公式推导过程 FPGA做MAC功能,直接挂PHY芯片发送网络报文

落花浮王杯 提交于 2019-12-12 15:24:55
【推荐】2019 Java 开发者跳槽指南.pdf(吐血整理) >>> 最近花了一周时间调试这个功能,因为网上找的很多文章,包括MAC层协议说明与FPGA做CRC32算法的研究等,有些地方描述的不一致,导致调试的过程中走了很多弯路,特地把最近收集的以及自己思考的成果记录下来,如果有什么地方不对的,希望看到的人能指点一下。 一、FPGA做MAC首先就是与PHY的接口问题,常用的百兆接口有MII和RMII,传输速率一样,不过MII是4bit传输,时钟25M,而RMII是2bit传输,时钟是50M,这两种接口每秒钟传输的数据量一样,具体区别就不做介绍了。 我用的是MII接口,看PHY的芯片手册观察,操作大概就是25M的txc的下降沿,把使能en和数据txd赋值,上升沿的时候PHY芯片会锁存这些值并做处理。 二、其次FPGA做MAC与PHY通信上之后,需要遵循一定的协议,才能借助于PHY把想要发送的数据通过报文方式发送出去,这种协议就是MAC协议,也叫IEEE 802.3 a、引导码和定界字符,PHY在捕捉到7个字节101010....相间的二进制后,再捕捉一个字节的10101011,PHY就判断后面的数据就是6个字节的目标MAC,6个字节的源MAC,2个字节的报文类型等等。MAC层要求定界字符之后的内容要在64字节到1518个字节之间,其中包括14自己的目标和源MAC

BLE Number of Packet per Connection Interval in Wireshark

我是研究僧i 提交于 2019-12-12 03:46:35
问题 I need to know exactly how many packets per interval my BLE can handle. The peripheral, as per its datasheet, handles 6 packets per interval, but I have been unable to find out how many packets the Central can handle. The Central device is a Motorola Moto G (generation 2), running Android 5.0.2. By examining he btsnoop_hci.log file I have been able to identify multiple connection parameters, such as the connection interval (7.5ms in my case). My questions is wheter it is possible to determine

decodingTCAP message - dialoguePortion

前提是你 提交于 2019-12-12 02:25:17
问题 I'm writing an simulator (for learning purposes) for complete M3UA-SCCP-TCAP-MAP stack (over SCTP). So far M3UA+SCCP stacks are OK. M3UA Based on the RFC 4666 Sept 2006 SCCP Based on the ITU-T Q.711-Q716 TCAP Based on the ITU-T Q.771-Q775 But upon decoding TCAP part I got lost on dialoguePortion. TCAP is asn.1 encoded, so everything is tag+len+data. Wireshark decode it differently than my decoder. Message is:

MySQL queries coming on TCP instead of MySQL Protocol

夙愿已清 提交于 2019-12-12 01:39:46
问题 I'm trying to capture MySQL activities through my web application and MySQL Server by using Wireshark on Windows. I've seen that most of questions about capturing packets related to MySQL return MySQL Protocol and the possibility of seeing the queries sent and their responses. Yet, when running Wireshark and using my application, I see only TCP packets coming and going, as can be seen in the pictures in the links below. TCP Packet -> Src - Dst Inside TCP Packet It's important to note that I

Explain Key Block and master secret with padding and encrytion in SSL/TLS?

倖福魔咒の 提交于 2019-12-12 01:27:54
问题 How to see the encrypted key in wireshark, during ssl key exchange? Referring to this answer for this question: Could you explain why does the Pre-master encrypted is 128 bits, how does RSA public key of 2048 bits encrypt 48 bits data to 128 bits, because the client and server confirms and use the symmetric encryption only after the Change_Cipher_Spec record. The key expanded to 136 bits, is it the Master Secret padded and where is this used in encryption. Can you explain the use/generation

Python(2.7) keeps crashing when launching scapy via console or importing it

断了今生、忘了曾经 提交于 2019-12-12 01:22:33
问题 Regardless of if I do scapy or Python from scapy.all import * it simply crashes python. It says "Python is not responding" with the classic little bar that does nothing. I'm currently on Win10. There's only one other person that I found had this problem, and nobody bothered to answer him, couldn't find anything else about this. I've tried multiple installers from differently packaged ones. No can do. I'm about to go raving mad. Many thanks in advance. 回答1: Well, nobody put an answer, but I

Wireshark Lua dissector plugin table error

痴心易碎 提交于 2019-12-11 17:50:59
问题 I have packet with trailer data after the packet as in ixia timestamp trailer. I am trying to write a dissector for Wireshark that is quite the same as ixia-packet_trailer plugin. https://raw.githubusercontent.com/boundary/wireshark/master/epan/dissectors/packet-ixiatrailer.c But i wanted to write in Lua, so it is easiest to change. So i replace the C line heur_dissector_add("eth.trailer", dissect_ixiatrailer, proto_ixiatrailer); by the following in the Lua eth_table = DissectorTable.get("eth

Wireshark实践

谁都会走 提交于 2019-12-11 16:38:47
TCP三次握手过程分析 【首先是ping www.baidu.com 】 1.第一次握手:客户端发送一个SYN =1 和Seq =X 给服务器 2.第二次握手:服务器收到客户端发送的报文后,由SYN=1知道客户端要求建立联机,向客户端发送一个SYN=1,ACK =1,Seq=0的报文 3.第三次握手:客户端收到服务器返回的报文后,检测ACK是否确证,若正确,客户端再次发送确认包,ACK=1,SYN为0,Seq=1 ,服务端收到ACK=1后,连接成功,可以传输数据了 TCP四次分手过程分析 1.第一次分手:客户端传给服务器一个Seq =1 ,ACK=1 , FIN=1 的报文,用来关闭客户端到服务端的数据传输 2.第二次分手:服务器收到FIN=1的报文后,知道客户端要关闭连接,返回ACK=2(客户端传给服务端的Seq+1),Seq=1(客户端传给服务端的ACK值) 3.第三次分手:服务器关闭与客户端的连接,返回客户端一个FIN=1,ACK=2,Seq=1 4.第四次分手:客户端收到服务端返回的FIN之后,返回ACK=2(服务端返回给客户端的Seq+1),Seq=2(服务端返回给客户端的ACK) 参考网址: https://blog.csdn.net/youxiansanren/article/details/52435239 来源: https://www.cnblogs.com

Split wireshark to miliseconds

ぐ巨炮叔叔 提交于 2019-12-11 14:24:43
问题 How to split wireshark files based on time interval. Editcap does not allow to split files in milliseconds? Can give only seconds using editcap -i . 回答1: This will be supported in Wireshark 3.2.0, which is due to be released this fall. If you need the functionality sooner you can try one of the 3.1 automated builds. 来源: https://stackoverflow.com/questions/57004719/split-wireshark-to-miliseconds

wireshark抓包工具详细说明及操作使用

南楼画角 提交于 2019-12-11 12:08:28
设置捕获接口 停止与重新监听 数据包的保存 wireshark是非常流行的网络封包分析软件,功能十分强大。可以截取各种网络封包,显示网络封包的详细信息。使用wireshark的人必须了解网络协议,否则就看不懂wireshark了。 为了安全考虑,wireshark只能查看封包,而不能修改封包的内容,或者发送封包。 wireshark能获取HTTP,也能获取HTT PS ,但是不能解密HTTPS,所以wireshark看不懂HTTPS中的内容,总结,如果是处理HTTP,HTTPS 还是用Fiddler, 其他协议比如TCP,UDP 就用wireshark. Wireshark(网络嗅探抓包工具) v1.4.9 中文版(包含中文手册+主界面的操作菜单) 评分: 6.0 类别: 远程监控 大小:22M 语言: 中文 查看详细信息 >> wireshark 开始抓包 开始界面 wireshark是捕获机器上的某一块网卡的网络包 ,当你的机器上有多块网卡的时候,你需要选择一个网卡。 点击Caputre->Interfaces.. 出现下面对话框,选择正确的网卡。然后点击"Start"按钮, 开始抓包 Wireshark 窗口介绍 WireShark 主要分为这几个界面 1. Display Filter(显示过滤器), 用于过滤 2. Packet List Pane(封包列表),