Wireshark-HB 1188-Wi-Fi Ethernet II, Sec: Intel_a4:56:ef (4:1d:96:04:56:ef), Ost: BelkinIntern_c4:26:18 (60:38:00:14:26:18) >Destination: BelkinIntern 04:261f8 (60:38:00:04:26:18) >Source: Intel asibief (4c:1d:96:44:56:ef) Туре: IPv4 (0x8000) Internet Protocol Version 4, Sec: 192.168.1.128, Ost: 208.80.154.224 0100 Version: 4 0101 Header Length: 20 bytes (5) ferentiated Services Field: exee (osCP: cse, ECNI NO-ECT) Length: 52 Identification: exca9f (51871) Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 Transmission Control Protocol, Src Port: $2494, Ost Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port 443 [Stream index: 19] >[Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Number: (celative sequence number) 0000 60 35 00 c4 26 fa 4c 1d 0010 00 34 ca 9f 40 00 40 06 0020 9a e0 cd Be 01 bb cb c7 0030 fa fo 2d se 00 02 04 0040 04 02 96 a4 b6 ef os o 00 00 ce as 01 7d f7 00 00 00 05 01 03 03 03 01 01 *Wi-Fi 文件() 编辑(E) 视图)_跳转(G) 捕获C) 分析(A) 统计(S)电话) 无线) 工具帮助(H) Q Q Q ip.addr == 208.80.154.224 No. Time Source Destination Protocol Length Info 1188 10.125146 1193 10.166123 1195 10.170063 1196 10.170112 1197 10.208541 1198 10.208541 1199 10.208541 1200 10.214907 1201 10.214984 1202 10.215010 1203 10.215024 1204 10.255964 1205 10.255964 1206 10.255964 1207 10.255964 1208 10.255964 1209 10.255964 1210 10.255964 1211 10.255964 1212 10.258875 1213 10.258875 1214 10.261903 1215 10.261903 1216 10.262781 1217 10.262826 192.168.1.128 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 192.168.1.128 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 TCP TCP TCP TLSv1.3 TLSv1.3 TCP TCP TLSv1.3 134 Change Cipher Spec, Application Data TLSv1.3 66 52494 + 443 [SYN] Seq=0 Win=64240 Len-0 MSS=1460 WS=256 SACK_PERM 66 443 + 52494 [SYN, ACK] Seq=0 Ack=1 Win=42340 Len-0 MSS=1436 SACK_PERM WS=512 54 52494443 [ACK] Seq=1 Ack=1 Win=132096 Len=0 571 Client Hello (SNI=www.wikipedia.org) 1514 Server Hello, Change Cipher Spec, Application Data 1514 443 → 52494 [PSH, ACK] Seq=1461 Ack=518 Win-42496 Len=1460 [TCP segment of a reassembled PDU] TLSv1.3 1124 Application Data, Application Data, Application Data 54 52494 + 443 [ACK] Seq-518 Ack=2921 Win=132096 Len=0 152 Application Data TLSv1.3 TCP 568 Application Data 54 443 + 52494 [ACK] Seq=3991 Ack=1210 Win=41984 Len=0 TLSv1.3 341 Application Data TLSv1.3 325 Application Data TLSv1.3 TCP 106 Application Data TCP TCP TCP TCP TCP TCP TCP TCP 1218 10.262844 192.168.1.128 208.80.154.224 208.80.154.224 TCP TCP 52494 443 [ACK] Seq=1210 Ack=6061 Win-132096 Len=0 1514 443 + 52494 [ACK] Seq-4601 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq-6061 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=7521 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=8981 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=10441 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 52494 [PSH, ACK] Seq=11901 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=13361 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=14821 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 54 52494 → 443 [ACK] Seq=1210 Ack=4549 Win=132096 Len=0 54 52494443 [ACK] Seq=1210 Ack=8981 Win=132096 Len=0 > Frame 1188: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{4D49CD83-B279-4E52-8FCB-8380A96FCFF > Ethernet II, Src: Intel_a4:b6:ef (4c:1d:96: a4:b6:ef), Dst: BelkinIntern_c4:26:f8 (60:38:e0:14:26:f8) ▾ Internet Protocol Version 4, Src: 192.168.1.128, Dst: 208.80.154.224 0000 60 38 e0 26 f8 4c 1d 0010 00 34 40 00 40 06 0020 9a e0 cd 01 bb cb c7 0030 fa f0 2d 80 00 00 02 04 0040 04 02 96 a4 b6 00 00 08 00 45 00 8. & L E de 50 4@@ ......P 7d f7 00 00 00 80 02 05 b4 01 03 03 08 01 01 } 0100 Version: 0101 Header Length: 20 bytes (5) .... > Differentiated Services Field: 0x00 (DSCP: CSO, ECN: Not-ECT) Total Length: 52 Identification: Oxca9f (51871) > 010. Flags: 0x2, Don't fragment ...0 0000 0000 0000 = Fragment offset: 0 Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 ✓ Transmission Control Protocol, Src Port: 52494, Dst Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port: 443 [Stream index: 19] > [Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Sequence Number: 0 (relative sequence number) Sequence Number (raw): 3418848759 [Next Sequence Number: 1 (relative sequence number)]
Wireshark-HB 1188-Wi-Fi Ethernet II, Sec: Intel_a4:56:ef (4:1d:96:04:56:ef), Ost: BelkinIntern_c4:26:18 (60:38:00:14:26:18) >Destination: BelkinIntern 04:261f8 (60:38:00:04:26:18) >Source: Intel asibief (4c:1d:96:44:56:ef) Туре: IPv4 (0x8000) Internet Protocol Version 4, Sec: 192.168.1.128, Ost: 208.80.154.224 0100 Version: 4 0101 Header Length: 20 bytes (5) ferentiated Services Field: exee (osCP: cse, ECNI NO-ECT) Length: 52 Identification: exca9f (51871) Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 Transmission Control Protocol, Src Port: $2494, Ost Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port 443 [Stream index: 19] >[Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Number: (celative sequence number) 0000 60 35 00 c4 26 fa 4c 1d 0010 00 34 ca 9f 40 00 40 06 0020 9a e0 cd Be 01 bb cb c7 0030 fa fo 2d se 00 02 04 0040 04 02 96 a4 b6 ef os o 00 00 ce as 01 7d f7 00 00 00 05 01 03 03 03 01 01 *Wi-Fi 文件() 编辑(E) 视图)_跳转(G) 捕获C) 分析(A) 统计(S)电话) 无线) 工具帮助(H) Q Q Q ip.addr == 208.80.154.224 No. Time Source Destination Protocol Length Info 1188 10.125146 1193 10.166123 1195 10.170063 1196 10.170112 1197 10.208541 1198 10.208541 1199 10.208541 1200 10.214907 1201 10.214984 1202 10.215010 1203 10.215024 1204 10.255964 1205 10.255964 1206 10.255964 1207 10.255964 1208 10.255964 1209 10.255964 1210 10.255964 1211 10.255964 1212 10.258875 1213 10.258875 1214 10.261903 1215 10.261903 1216 10.262781 1217 10.262826 192.168.1.128 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 192.168.1.128 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 TCP TCP TCP TLSv1.3 TLSv1.3 TCP TCP TLSv1.3 134 Change Cipher Spec, Application Data TLSv1.3 66 52494 + 443 [SYN] Seq=0 Win=64240 Len-0 MSS=1460 WS=256 SACK_PERM 66 443 + 52494 [SYN, ACK] Seq=0 Ack=1 Win=42340 Len-0 MSS=1436 SACK_PERM WS=512 54 52494443 [ACK] Seq=1 Ack=1 Win=132096 Len=0 571 Client Hello (SNI=www.wikipedia.org) 1514 Server Hello, Change Cipher Spec, Application Data 1514 443 → 52494 [PSH, ACK] Seq=1461 Ack=518 Win-42496 Len=1460 [TCP segment of a reassembled PDU] TLSv1.3 1124 Application Data, Application Data, Application Data 54 52494 + 443 [ACK] Seq-518 Ack=2921 Win=132096 Len=0 152 Application Data TLSv1.3 TCP 568 Application Data 54 443 + 52494 [ACK] Seq=3991 Ack=1210 Win=41984 Len=0 TLSv1.3 341 Application Data TLSv1.3 325 Application Data TLSv1.3 TCP 106 Application Data TCP TCP TCP TCP TCP TCP TCP TCP 1218 10.262844 192.168.1.128 208.80.154.224 208.80.154.224 TCP TCP 52494 443 [ACK] Seq=1210 Ack=6061 Win-132096 Len=0 1514 443 + 52494 [ACK] Seq-4601 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq-6061 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=7521 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=8981 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=10441 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 52494 [PSH, ACK] Seq=11901 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=13361 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=14821 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 54 52494 → 443 [ACK] Seq=1210 Ack=4549 Win=132096 Len=0 54 52494443 [ACK] Seq=1210 Ack=8981 Win=132096 Len=0 > Frame 1188: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{4D49CD83-B279-4E52-8FCB-8380A96FCFF > Ethernet II, Src: Intel_a4:b6:ef (4c:1d:96: a4:b6:ef), Dst: BelkinIntern_c4:26:f8 (60:38:e0:14:26:f8) ▾ Internet Protocol Version 4, Src: 192.168.1.128, Dst: 208.80.154.224 0000 60 38 e0 26 f8 4c 1d 0010 00 34 40 00 40 06 0020 9a e0 cd 01 bb cb c7 0030 fa f0 2d 80 00 00 02 04 0040 04 02 96 a4 b6 00 00 08 00 45 00 8. & L E de 50 4@@ ......P 7d f7 00 00 00 80 02 05 b4 01 03 03 08 01 01 } 0100 Version: 0101 Header Length: 20 bytes (5) .... > Differentiated Services Field: 0x00 (DSCP: CSO, ECN: Not-ECT) Total Length: 52 Identification: Oxca9f (51871) > 010. Flags: 0x2, Don't fragment ...0 0000 0000 0000 = Fragment offset: 0 Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 ✓ Transmission Control Protocol, Src Port: 52494, Dst Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port: 443 [Stream index: 19] > [Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Sequence Number: 0 (relative sequence number) Sequence Number (raw): 3418848759 [Next Sequence Number: 1 (relative sequence number)]
Related questions
Question
Just looking at the first 50 packets, how many different protocols were used by your computer and how many different IP destinations?
AI-Generated Solution
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
Unlock instant AI solutions
Tap the button
to generate a solution