wireshark

can't receive UDP packages when wire-shark is off

烈酒焚心 提交于 2019-12-11 01:49:35
问题 this is my first post in here. I have an embedded Ethernet PIC32 uC that is sending UDP packages on one specific port to my C# Program on my PC. With C# i want to grab this packages as follows: UdpClient udpClient = new UdpClient( 20011 ); IPEndPoint sender = new IPEndPoint(IPAddress.Any, 0); while (true) { byte[] content = udpClient.Receive(ref sender); } A package looks like this (wireshark): Source: 192.168.1.38 Destination: 192.168.1.44 Protocol: UDP Length: 122 Source port: 1000

postgreSQL function call packet

蓝咒 提交于 2019-12-10 23:49:54
问题 As postgreSQL documentation says about it's packets here a function call must send a packet with 'F' identifier to server. So I defined a simple function and called it with select statement and after monitoring my connection port using wireshark I see no 'F' identified packet, just multiple simple query packets ( 'Q' identified). Am I missing something here? 回答1: That is a misunderstanding. A function that is called inside a SELECT statement is part of the statement text in a Query

Is possible to detect touches in MiBand 2?

老子叫甜甜 提交于 2019-12-10 18:27:10
问题 I have viewed many unofficial MiBand SDKs in Github. (e.g. https://github.com/Freeyourgadget/Gadgetbridge) None includes detect when button touching, but I have viewed apps to detect this feature. For example Mi Band 2 Func Button. Also I have tried sniffing bluetooth data traces, but just show data because mobile device is not rooted and I haven't rooted. Is there any way I can detect the touch of a miband button? Thanks a lot! 回答1: You can listen if there is any touches event on the Mi Band

Parsing large tcpdump files in python

冷暖自知 提交于 2019-12-10 16:49:11
问题 I have a large tcpdump capture ( with > 1gb of data in a .dump file) which I would like to parse to get some statistics like the number of different IPs involved in sending traffic, etc. I would like to know if there is a clean way of accessing such data in the binary trace file through python? The way I tried doing it is by running tcpdump -r something.dump > myfile.out And then try to parse myfile.out with python code to get the data i want. But the command above is taking forever to

Why is the size of the forked repository so huge in GitHub?

自闭症网瘾萝莉.ら 提交于 2019-12-10 16:28:51
问题 I am a newbie to github and I am required to have an understanding of wireshark by analyzing its source code. The source code is apparently around 23 MB but if I try to do a git clone from the link provided in the website, it turns out to be around 636 MB . Can someone please shed some light as to why the clone is so big compared to the source code? 回答1: When you clone a repository with git ... that's what you're doing; cloning a repository . You're getting all the branches and their

WireShark - Can I decode UTF-8 data in the packets?

╄→尐↘猪︶ㄣ 提交于 2019-12-10 12:38:23
问题 In Wireshark, how can I see non-ASCI characters in packets? some of my network data is in UTF-8 encoding and I would like Wireshark to recognize it. Is there a plugin for it? I found this but maybe there is something new about that. I want to see Arabic, Chinese and Hebrew. 回答1: In Wireshark, how can I see non-ASCI characters in a packet? some of my data in the packets is in the UTF-8 encoding and I would like Wireshark to recognize it. Is there a plugin for it? No - that's not what Wireshark

Cannot understand 802.11 Data Frame format in PcapNG file

余生长醉 提交于 2019-12-10 11:18:09
问题 I have PcapNG files created by Wireshark, which I try to parse with python-pcapng . However, I cannot figure out how to reconcile the output I receive from FileScanner 's packet_payload_info with the 802.11 Data frame format : This is the output I get (my code is at the bottom): magic_number 0xa0d0d0a SectionHeader(version_major=1, version_minor=0, section_length=-1, options=Options({'shb_userappl': [u'Dumpcap 1.12.4 (v1.12.4-0-gb4861da from master-1.12)'], 'shb_os': [u'Mac OS X 10.10.2,

Building a webserver, client doesn't acknowledge HTTP 200 OK frame

主宰稳场 提交于 2019-12-10 11:17:14
问题 I'm building my own webserver based on a tutorial. I have found a simple way to initiate a TCP connection and send one segment of http data (the webserver will run on a microcontroller, so it will be very small) Anyway, the following is the sequence I need to go through: receive SYN send SYN,ACK receive ACK (the connection is now established) receive ACK with HTTP GET command send ACK send FIN,ACK with HTTP data (e.g 200 OK) receive FIN,ACK <- I don't recieve this packet! send ACK Everything

Where did Wireshark/tcpdump/libpcap intercept packet inside Linux kernel?

爱⌒轻易说出口 提交于 2019-12-10 10:36:53
问题 According to this, wireshark is able to get the packet before it is dropped (therefore I cannot get such packets by myself). And I'm still wondering the exact location in linux kernel for wireshark to fetch the packets. The answer goes as "On UN*Xes, it uses libpcap, which, on Linux, uses AF_PACKET sockets." Does anyone have more concrete example to use "AF_PACKET sockets"? If I understand wireshark correctly, the network interface card (NIC) will make a copy of all incoming packets and send

通过wireshark分析ARP协议

拟墨画扇 提交于 2019-12-10 08:41:57
什么是地址解析协议:   地址解析协议,即ARP(Address Resolution Protocol),是根据IP地址获取物理地址的一个TCP/IP协议。主机发送信息时将包含目标IP地址的ARP请求广播到局域网络上的所有主机,并接收返回消息,以此确定目标的物理地址;收到返回消息后将该IP地址和物理地址存入本机ARP缓存中并保留一定时间,下次请求时直接查询ARP缓存以节约资源。 实现过程: 同网段:   在同一局域网内,如果主机A要想通过B的IP地址确定其MAC地址并和B进行数据交互,需要按照ARP协议的”广播请求和单播应答”来确定主机B的MAC地址。   假如A表示我本机地址192.168.1.8,B表示192.168.1.2,实现过程为:   1) A先查看自己的ARP高速缓存表中是否有B主机的MAC地址记录。     用arp -a查看发现确实有:    为了便于测试,我先删除:arp -ad 192.168.1.2 (要管理员权限)   2) 如果A的ARP高速缓存表中有B的MAC地址记录,则直接通过这个MAC地址进行数据的传输。   3) 如果A主机的ARP高速缓存中没有B主机的记录,则会向局域网的所有主机广播一个ARP请求报文,寻找B主机的MAC地址。     现在A的arp缓存没有B的记录,ping 一下B:ping 192.168.1.2;