Wireshark-HB 1188-Wi-Fi Ethernet II, Sec: Intel_a4:56:ef (4:1d:96:04:56:ef), Ost: BelkinIntern_c4:26:18 (60:38:00:14:26:18) >Destination: BelkinIntern 04:261f8 (60:38:00:04:26:18) >Source: Intel asibief (4c:1d:96:44:56:ef) Туре: IPv4 (0x8000) Internet Protocol Version 4, Sec: 192.168.1.128, Ost: 208.80.154.224 0100 Version: 4 0101 Header Length: 20 bytes (5) ferentiated Services Field: exee (osCP: cse, ECNI NO-ECT) Length: 52 Identification: exca9f (51871) Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 Transmission Control Protocol, Src Port: $2494, Ost Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port 443 [Stream index: 19] >[Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Number: (celative sequence number) 0000 60 35 00 c4 26 fa 4c 1d 0010 00 34 ca 9f 40 00 40 06 0020 9a e0 cd Be 01 bb cb c7 0030 fa fo 2d se 00 02 04 0040 04 02 96 a4 b6 ef os o 00 00 ce as 01 7d f7 00 00 00 05 01 03 03 03 01 01 *Wi-Fi 文件() 编辑(E) 视图)_跳转(G) 捕获C) 分析(A) 统计(S)电话) 无线) 工具帮助(H) Q Q Q ip.addr == 208.80.154.224 No. Time Source Destination Protocol Length Info 1188 10.125146 1193 10.166123 1195 10.170063 1196 10.170112 1197 10.208541 1198 10.208541 1199 10.208541 1200 10.214907 1201 10.214984 1202 10.215010 1203 10.215024 1204 10.255964 1205 10.255964 1206 10.255964 1207 10.255964 1208 10.255964 1209 10.255964 1210 10.255964 1211 10.255964 1212 10.258875 1213 10.258875 1214 10.261903 1215 10.261903 1216 10.262781 1217 10.262826 192.168.1.128 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 192.168.1.128 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 TCP TCP TCP TLSv1.3 TLSv1.3 TCP TCP TLSv1.3 134 Change Cipher Spec, Application Data TLSv1.3 66 52494 + 443 [SYN] Seq=0 Win=64240 Len-0 MSS=1460 WS=256 SACK_PERM 66 443 + 52494 [SYN, ACK] Seq=0 Ack=1 Win=42340 Len-0 MSS=1436 SACK_PERM WS=512 54 52494443 [ACK] Seq=1 Ack=1 Win=132096 Len=0 571 Client Hello (SNI=www.wikipedia.org) 1514 Server Hello, Change Cipher Spec, Application Data 1514 443 → 52494 [PSH, ACK] Seq=1461 Ack=518 Win-42496 Len=1460 [TCP segment of a reassembled PDU] TLSv1.3 1124 Application Data, Application Data, Application Data 54 52494 + 443 [ACK] Seq-518 Ack=2921 Win=132096 Len=0 152 Application Data TLSv1.3 TCP 568 Application Data 54 443 + 52494 [ACK] Seq=3991 Ack=1210 Win=41984 Len=0 TLSv1.3 341 Application Data TLSv1.3 325 Application Data TLSv1.3 TCP 106 Application Data TCP TCP TCP TCP TCP TCP TCP TCP 1218 10.262844 192.168.1.128 208.80.154.224 208.80.154.224 TCP TCP 52494 443 [ACK] Seq=1210 Ack=6061 Win-132096 Len=0 1514 443 + 52494 [ACK] Seq-4601 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq-6061 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=7521 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=8981 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=10441 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 52494 [PSH, ACK] Seq=11901 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=13361 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=14821 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 54 52494 → 443 [ACK] Seq=1210 Ack=4549 Win=132096 Len=0 54 52494443 [ACK] Seq=1210 Ack=8981 Win=132096 Len=0 > Frame 1188: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{4D49CD83-B279-4E52-8FCB-8380A96FCFF > Ethernet II, Src: Intel_a4:b6:ef (4c:1d:96: a4:b6:ef), Dst: BelkinIntern_c4:26:f8 (60:38:e0:14:26:f8) ▾ Internet Protocol Version 4, Src: 192.168.1.128, Dst: 208.80.154.224 0000 60 38 e0 26 f8 4c 1d 0010 00 34 40 00 40 06 0020 9a e0 cd 01 bb cb c7 0030 fa f0 2d 80 00 00 02 04 0040 04 02 96 a4 b6 00 00 08 00 45 00 8. & L E de 50 4@@ ......P 7d f7 00 00 00 80 02 05 b4 01 03 03 08 01 01 } 0100 Version: 0101 Header Length: 20 bytes (5) .... > Differentiated Services Field: 0x00 (DSCP: CSO, ECN: Not-ECT) Total Length: 52 Identification: Oxca9f (51871) > 010. Flags: 0x2, Don't fragment ...0 0000 0000 0000 = Fragment offset: 0 Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 ✓ Transmission Control Protocol, Src Port: 52494, Dst Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port: 443 [Stream index: 19] > [Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Sequence Number: 0 (relative sequence number) Sequence Number (raw): 3418848759 [Next Sequence Number: 1 (relative sequence number)]

icon
Related questions
Question

Just looking at the first 50 packets, how many different protocols were used by your computer and how many different IP destinations?

 

Wireshark-HB 1188-Wi-Fi
Ethernet II, Sec: Intel_a4:56:ef (4:1d:96:04:56:ef), Ost: BelkinIntern_c4:26:18 (60:38:00:14:26:18)
>Destination: BelkinIntern 04:261f8 (60:38:00:04:26:18)
>Source: Intel asibief (4c:1d:96:44:56:ef)
Туре: IPv4 (0x8000)
Internet Protocol Version 4, Sec: 192.168.1.128, Ost: 208.80.154.224
0100 Version: 4
0101 Header Length: 20 bytes (5)
ferentiated Services Field: exee (osCP: cse, ECNI NO-ECT)
Length: 52
Identification: exca9f (51871)
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x0000 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.128
Destination Address: 208.80.154.224
Transmission Control Protocol, Src Port: $2494, Ost Port: 443, Seq: 0, Len: 0
Source Port: 52494
Destination Port 443
[Stream index: 19]
>[Conversation completeness: Incomplete, DATA (15)]
[TCP Segment Len: 0]
Number: (celative sequence number)
0000 60 35 00 c4 26 fa 4c 1d
0010 00 34 ca 9f 40 00 40 06
0020 9a e0 cd Be 01 bb cb c7
0030 fa fo 2d se 00 02 04
0040 04 02
96 a4 b6 ef os o
00 00 ce as 01
7d f7 00 00 00
05
01 03 03 03 01 01
Transcribed Image Text:Wireshark-HB 1188-Wi-Fi Ethernet II, Sec: Intel_a4:56:ef (4:1d:96:04:56:ef), Ost: BelkinIntern_c4:26:18 (60:38:00:14:26:18) >Destination: BelkinIntern 04:261f8 (60:38:00:04:26:18) >Source: Intel asibief (4c:1d:96:44:56:ef) Туре: IPv4 (0x8000) Internet Protocol Version 4, Sec: 192.168.1.128, Ost: 208.80.154.224 0100 Version: 4 0101 Header Length: 20 bytes (5) ferentiated Services Field: exee (osCP: cse, ECNI NO-ECT) Length: 52 Identification: exca9f (51871) Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 Transmission Control Protocol, Src Port: $2494, Ost Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port 443 [Stream index: 19] >[Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Number: (celative sequence number) 0000 60 35 00 c4 26 fa 4c 1d 0010 00 34 ca 9f 40 00 40 06 0020 9a e0 cd Be 01 bb cb c7 0030 fa fo 2d se 00 02 04 0040 04 02 96 a4 b6 ef os o 00 00 ce as 01 7d f7 00 00 00 05 01 03 03 03 01 01
*Wi-Fi
文件() 编辑(E) 视图)_跳转(G) 捕获C) 分析(A) 统计(S)电话) 无线) 工具帮助(H)
Q Q Q
ip.addr == 208.80.154.224
No.
Time
Source
Destination
Protocol Length Info
1188 10.125146
1193 10.166123
1195 10.170063
1196 10.170112
1197 10.208541
1198 10.208541
1199 10.208541
1200 10.214907
1201 10.214984
1202 10.215010
1203 10.215024
1204 10.255964
1205 10.255964
1206 10.255964
1207 10.255964
1208 10.255964
1209 10.255964
1210 10.255964
1211 10.255964
1212 10.258875
1213 10.258875
1214 10.261903
1215 10.261903
1216 10.262781
1217 10.262826
192.168.1.128
208.80.154.224
192.168.1.128
192.168.1.128
208.80.154.224
208.80.154.224
208.80.154.224
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
192.168.1.128
192.168.1.128
208.80.154.224
192.168.1.128
208.80.154.224
208.80.154.224
192.168.1.128
192.168.1.128
192.168.1.128
208.80.154.224
208.80.154.224
208.80.154.224
208.80.154.224
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
192.168.1.128
208.80.154.224
TCP
TCP
TCP
TLSv1.3
TLSv1.3
TCP
TCP
TLSv1.3
134 Change Cipher Spec, Application Data
TLSv1.3
66 52494 + 443 [SYN] Seq=0 Win=64240 Len-0 MSS=1460 WS=256 SACK_PERM
66 443 + 52494 [SYN, ACK] Seq=0 Ack=1 Win=42340 Len-0 MSS=1436 SACK_PERM WS=512
54 52494443 [ACK] Seq=1 Ack=1 Win=132096 Len=0
571 Client Hello (SNI=www.wikipedia.org)
1514 Server Hello, Change Cipher Spec, Application Data
1514 443 → 52494 [PSH, ACK] Seq=1461 Ack=518 Win-42496 Len=1460 [TCP segment of a reassembled PDU]
TLSv1.3 1124 Application Data, Application Data, Application Data
54 52494 + 443 [ACK] Seq-518 Ack=2921 Win=132096 Len=0
152 Application Data
TLSv1.3
TCP
568 Application Data
54 443 + 52494 [ACK] Seq=3991 Ack=1210 Win=41984 Len=0
TLSv1.3
341 Application Data
TLSv1.3
325 Application Data
TLSv1.3
TCP
106 Application Data
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
1218 10.262844
192.168.1.128
208.80.154.224
208.80.154.224
TCP
TCP
52494 443 [ACK] Seq=1210 Ack=6061 Win-132096 Len=0
1514 443 + 52494 [ACK] Seq-4601 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
1514 443 + 52494 [PSH, ACK] Seq-6061 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
1514 443 + 52494 [ACK] Seq=7521 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
1514 443 + 52494 [PSH, ACK] Seq=8981 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
1514 443 + 52494 [ACK] Seq=10441 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
1514 443 52494 [PSH, ACK] Seq=11901 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
1514 443 + 52494 [ACK] Seq=13361 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
1514 443 + 52494 [PSH, ACK] Seq=14821 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU]
54 52494 → 443 [ACK] Seq=1210 Ack=4549 Win=132096 Len=0
54 52494443 [ACK] Seq=1210 Ack=8981 Win=132096 Len=0
> Frame 1188: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{4D49CD83-B279-4E52-8FCB-8380A96FCFF
> Ethernet II, Src: Intel_a4:b6:ef (4c:1d:96: a4:b6:ef), Dst: BelkinIntern_c4:26:f8 (60:38:e0:14:26:f8)
▾ Internet Protocol Version 4, Src: 192.168.1.128, Dst: 208.80.154.224
0000 60 38 e0 26 f8 4c 1d
0010 00 34
40 00 40 06
0020 9a e0 cd 01 bb cb c7
0030 fa f0 2d 80 00 00 02 04
0040 04 02
96 a4 b6
00 00
08 00 45 00
8. & L
E
de 50
4@@
......P
7d f7 00
00 00 80 02
05 b4 01 03 03 08 01 01
}
0100
Version:
0101
Header Length: 20 bytes (5)
....
> Differentiated Services Field: 0x00 (DSCP: CSO, ECN: Not-ECT)
Total Length: 52
Identification: Oxca9f (51871)
> 010. Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment offset: 0
Time to Live: 64
Protocol: TCP (6)
Header Checksum: 0x0000 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.1.128
Destination Address: 208.80.154.224
✓ Transmission Control Protocol, Src Port: 52494, Dst Port: 443, Seq: 0, Len: 0
Source Port: 52494
Destination Port: 443
[Stream index: 19]
> [Conversation completeness: Incomplete, DATA (15)]
[TCP Segment Len: 0]
Sequence Number: 0 (relative sequence number)
Sequence Number (raw): 3418848759
[Next Sequence Number: 1 (relative sequence number)]
Transcribed Image Text:*Wi-Fi 文件() 编辑(E) 视图)_跳转(G) 捕获C) 分析(A) 统计(S)电话) 无线) 工具帮助(H) Q Q Q ip.addr == 208.80.154.224 No. Time Source Destination Protocol Length Info 1188 10.125146 1193 10.166123 1195 10.170063 1196 10.170112 1197 10.208541 1198 10.208541 1199 10.208541 1200 10.214907 1201 10.214984 1202 10.215010 1203 10.215024 1204 10.255964 1205 10.255964 1206 10.255964 1207 10.255964 1208 10.255964 1209 10.255964 1210 10.255964 1211 10.255964 1212 10.258875 1213 10.258875 1214 10.261903 1215 10.261903 1216 10.262781 1217 10.262826 192.168.1.128 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 208.80.154.224 192.168.1.128 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 208.80.154.224 208.80.154.224 208.80.154.224 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 192.168.1.128 208.80.154.224 TCP TCP TCP TLSv1.3 TLSv1.3 TCP TCP TLSv1.3 134 Change Cipher Spec, Application Data TLSv1.3 66 52494 + 443 [SYN] Seq=0 Win=64240 Len-0 MSS=1460 WS=256 SACK_PERM 66 443 + 52494 [SYN, ACK] Seq=0 Ack=1 Win=42340 Len-0 MSS=1436 SACK_PERM WS=512 54 52494443 [ACK] Seq=1 Ack=1 Win=132096 Len=0 571 Client Hello (SNI=www.wikipedia.org) 1514 Server Hello, Change Cipher Spec, Application Data 1514 443 → 52494 [PSH, ACK] Seq=1461 Ack=518 Win-42496 Len=1460 [TCP segment of a reassembled PDU] TLSv1.3 1124 Application Data, Application Data, Application Data 54 52494 + 443 [ACK] Seq-518 Ack=2921 Win=132096 Len=0 152 Application Data TLSv1.3 TCP 568 Application Data 54 443 + 52494 [ACK] Seq=3991 Ack=1210 Win=41984 Len=0 TLSv1.3 341 Application Data TLSv1.3 325 Application Data TLSv1.3 TCP 106 Application Data TCP TCP TCP TCP TCP TCP TCP TCP 1218 10.262844 192.168.1.128 208.80.154.224 208.80.154.224 TCP TCP 52494 443 [ACK] Seq=1210 Ack=6061 Win-132096 Len=0 1514 443 + 52494 [ACK] Seq-4601 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq-6061 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=7521 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=8981 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=10441 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 52494 [PSH, ACK] Seq=11901 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [ACK] Seq=13361 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 1514 443 + 52494 [PSH, ACK] Seq=14821 Ack=1210 Win=42496 Len=1460 [TCP segment of a reassembled PDU] 54 52494 → 443 [ACK] Seq=1210 Ack=4549 Win=132096 Len=0 54 52494443 [ACK] Seq=1210 Ack=8981 Win=132096 Len=0 > Frame 1188: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{4D49CD83-B279-4E52-8FCB-8380A96FCFF > Ethernet II, Src: Intel_a4:b6:ef (4c:1d:96: a4:b6:ef), Dst: BelkinIntern_c4:26:f8 (60:38:e0:14:26:f8) ▾ Internet Protocol Version 4, Src: 192.168.1.128, Dst: 208.80.154.224 0000 60 38 e0 26 f8 4c 1d 0010 00 34 40 00 40 06 0020 9a e0 cd 01 bb cb c7 0030 fa f0 2d 80 00 00 02 04 0040 04 02 96 a4 b6 00 00 08 00 45 00 8. & L E de 50 4@@ ......P 7d f7 00 00 00 80 02 05 b4 01 03 03 08 01 01 } 0100 Version: 0101 Header Length: 20 bytes (5) .... > Differentiated Services Field: 0x00 (DSCP: CSO, ECN: Not-ECT) Total Length: 52 Identification: Oxca9f (51871) > 010. Flags: 0x2, Don't fragment ...0 0000 0000 0000 = Fragment offset: 0 Time to Live: 64 Protocol: TCP (6) Header Checksum: 0x0000 [validation disabled] [Header checksum status: Unverified] Source Address: 192.168.1.128 Destination Address: 208.80.154.224 ✓ Transmission Control Protocol, Src Port: 52494, Dst Port: 443, Seq: 0, Len: 0 Source Port: 52494 Destination Port: 443 [Stream index: 19] > [Conversation completeness: Incomplete, DATA (15)] [TCP Segment Len: 0] Sequence Number: 0 (relative sequence number) Sequence Number (raw): 3418848759 [Next Sequence Number: 1 (relative sequence number)]
AI-Generated Solution
AI-generated content may present inaccurate or offensive content that does not represent bartleby’s views.
steps

Unlock instant AI solutions

Tap the button
to generate a solution