icmp fragmented.cap 106.4 KB
Submitted Aug 27, 2012 by altafk
pinged google.com with -l option in windows which allows us to set the data size of the packet.
Data size of 15000 bytes has been chosen and we can see that it is fragmented through the network into a maximum data size 1480 bytes in each packet.
We can also see offset and identification field set in the ip header.
|Packets: 77||Duration: 11s||Downloads: 4306|
ospf over gre tunnel.cap 8.2 KB
Submitted Jun 13, 2012 by altafk
Configured ospf over GRE tunnel in which packets are double tagged with ip header, useful when there is no direct connection between the 2 routers but still we need to run ospf.
|Packets: 63||Duration: 241s||Downloads: 11991|
connection termination.cap 316 bytes
Submitted Jun 5, 2012 by altafk
This is a connection termination packet in which both the server and client sends fin & ack to each other.
For details of how connection is been teared down by both client and server see the link below.
|Packets: 4||Duration: n/a||Downloads: 7684|
gratuitous arp hsrp.cap 480 bytes
Submitted May 16, 2012 by altafk
When router take the role of active in hsrp it sends a gratuitous arp in which source mac is 00:00:0c:07:ac:01, the switches update their mac table for the newly learned mac and starts forwarding to that port.
|Packets: 6||Duration: 6s||Downloads: 9060|
ospf simple password authentication.cap 766 bytes
Submitted May 14, 2012 by altafk
Simple password authentication in ospf in which we can see password in clear text.
Also the auth type is also specified in the packet which is simple password.
I have also found a very interesting article regarding md5 auth mistakes made by many network engineers the link of which is below.
|Packets: 7||Duration: 60s||Downloads: 6838|
icmp with record route option set.cap 1.2 KB
Submitted May 9, 2012 by altafk
ping packet with record route option set and IP addresses of all outgoing and incoming interfaces along the path.
In that we can also see position of current pointer.
|Packets: 10||Duration: 2s||Downloads: 6481|
dtls_null.cap 2.2 KB
Submitted May 5, 2012 by Kriki
DTLS handshake with one application data packet.
Authentication with server certificate only.
NULL encryption is used to demonstrate the transmission of "TESTING"
|Packets: 7||Duration: 7s||Downloads: 4130|
MSTP_Intra-Region_BPDUs.cap 1.7 KB
Submitted May 1, 2012 by lobo
MSTP BPDUs captured on an intra-region root port.
00:1f:27:b4:7d:80 - CIST Root (is in another MSTP Region)
00:16:46:b5:8c:80 - CIST Regional Root, Root for Instance 0, 2
00:1e:f7:05:a8:80 - Root for Instance 1
Notice in frame 1 that 00:1e:f7:05:a8:80 uses 32768.00:16:46:b5:8c:80 (Regional Root BID) as bridge ID in the main STP header to make the region appear as a single bridge.
|Packets: 10||Duration: 10s||Downloads: 9119|
IGMP_V1.cap 2.0 KB
Submitted Apr 2, 2012 by Emieeecy
All IGMP V1 requests : Query General, Join specific group
|Packets: 27||Duration: 259s||Downloads: 8002|
IGMP_V2.cap 1.3 KB
Submitted Mar 27, 2012 by Emieeecy
All IGMP V2 requests : Query General, Query specfic group, Join specific group, leave specific group
|Packets: 18||Duration: 133s||Downloads: 10423|
stun2.cap 102 bytes
Submitted Mar 2, 2012 by jello
Stun (2) Protocol. UDP Holepunching technique.
|Packets: 1||Duration: n/a||Downloads: 4397|
packet-c.cap 675.0 KB
Submitted Jan 31, 2012 by Slaingod
This is a packet capture from a SonicWall. We were troubleshooting DHCP packet flows. The SonicWall saw the DHCP Discover and Sent an Offer. We never saw the DHCP acknowledgement. In the adjacent core stacked switching we were running "debug ip dhcp server packets" we only saw discover packets from IP phones up to the SonicWall. For some reason the SonicWall could not let any other DHCP packets through or out of it INSIDE (LAN) interface. Even if we put an ANY-ANY ALC for that interface. We ended up having to replace the SonicWall and upload the configuration from the old SonicWall to the new one.
|Packets: 926||Duration: 13s||Downloads: 10406|
IPv6_RTSP.cap 15.5 KB
Submitted Jan 12, 2012 by Jawahar
This capture contains IPv6_RTSP packets. Accessed IPv6 enabled RTSP server using 6in4 tunnel.
|Packets: 17||Duration: 3s||Downloads: 5692|
OCSP-Not_Implemted.cap 1.1 KB
Submitted Jun 10, 2011 by kerlenpondi
|Packets: 10||Duration: n/a||Downloads: 7002|
OCSP-Revoked.cap 1.8 KB
Submitted Jun 10, 2011 by kerlenpondi
OCSP (Comodo - FAKE crt Addons-mozilla-org)
|Packets: 10||Duration: n/a||Downloads: 5508|
OCSP-Good.cap 3.5 KB
Submitted Jun 8, 2011 by kerlenpondi
OCSP_Good (CRL HTTPS CA Verisign)
|Packets: 14||Duration: 1s||Downloads: 6584|
traceroute_MPLS.cap 3.3 KB
Submitted May 14, 2011 by stretch
|Packets: 29||Duration: 3s||Downloads: 13143|
cm4116_telnet.cap 9.4 KB
Submitted Mar 1, 2011
Short Telnet session with an Opengear CM4116 used to demonstrate the urgent flag and pointer
|Packets: 113||Duration: 14s||Downloads: 10430|
HTTP.cap 24.9 KB
Submitted Mar 1, 2011
Simple HTTP transfer of a PNG image using wget
|Packets: 40||Duration: n/a||Downloads: 16939|
DHCP_MessageType 10,11,12 and 13.cap 1.9 KB
Submitted Jan 31, 2011 by Jawahar
Access Concentrator/router queries lease for particular IP addresses using message type as "DHCP LEASE QUERY" and gets response as DHCP LEASE ACTIVE,LEASE UNASSIGNED and LEASE UNKNOWN.
Access Concenttrator/Router IP=10.10.39.14
DHCP server IP=10.10.35.33
|Packets: 6||Duration: 13s||Downloads: 9743|
QinQ.pcap.cap 184 bytes
Submitted Jan 9, 2011 by Ysaad
ARP requests having two vlan IDs attached (QinQ)
|Packets: 2||Duration: 2s||Downloads: 11624|
iphttps.cap 12.4 KB
Submitted Nov 12, 2010 by nacnud
IP-HTTPS capture. This is Microsoft's IPv6 inside HTTPS tunneling for DirectAccess.
|Packets: 83||Duration: 38s||Downloads: 10575|
WCCPv2.pcap.cap 2.8 KB
Submitted Oct 5, 2010 by Ysaad
WCCP communication captures between 7200 Router and a WCCP capable optimization device (In my case it is Riverbed's Stealhead 2050)
|Packets: 15||Duration: 27s||Downloads: 6848|
LLDP_and_CDP.cap 4.0 KB
Submitted Oct 3, 2010
LLDP and CDP advertisements sent between two switches, S1 and S2.
|Packets: 12||Duration: 98s||Downloads: 10558|
TACACS+_encrypted.cap 2.8 KB
Submitted Sep 28, 2010
TACACS+ authentication and authorization requests as made by a Cisco IOS router upon a user logging in via Telnet.
|Packets: 34||Duration: 7s||Downloads: 9248|