snoop-working-ccm7.cap (203.0 KB)
|Packets: 191||Duration: 1081s||Downloads: 1131|
H323 Phone registering!!!
icmp fragmented.cap (106.4 KB)
|Packets: 77||Duration: 11s||Downloads: 1009|
pinged google.com with -l option in windows which allows us to set the data size of the packet.
Data size of 15000 bytes has been chosen and we can see that it is fragmented through the network into a maximum data size 1480 bytes in each packet.
We can also see offset and identification field set in the ip header.
ospf over gre tunnel.cap (8.2 KB)
|Packets: 63||Duration: 241s||Downloads: 8796|
Configured ospf over GRE tunnel in which packets are double tagged with ip header, useful when there is no direct connection between the 2 routers but still we need to run ospf.
connection termination.cap (316 bytes)
|Packets: 4||Duration: n/a||Downloads: 5002|
This is a connection termination packet in which both the server and client sends fin & ack to each other.
For details of how connection is been teared down by both client and server see the link below.
ospf simple password authentication.cap (766 bytes)
|Packets: 7||Duration: 60s||Downloads: 4641|
Simple password authentication in ospf in which we can see password in clear text.
Also the auth type is also specified in the packet which is simple password.
I have also found a very interesting article regarding md5 auth mistakes made by many network engineers the link of which is below.
|Packets: 10||Duration: 2s||Downloads: 4460|
ping packet with record route option set and IP addresses of all outgoing and incoming interfaces along the path.
In that we can also see position of current pointer.
dtls_null.cap (2.2 KB)
|Packets: 7||Duration: 7s||Downloads: 2801|
DTLS handshake with one application data packet.
Authentication with server certificate only.
NULL encryption is used to demonstrate the transmission of "TESTING"
IGMP_V1.cap (2.0 KB)
|Packets: 27||Duration: 259s||Downloads: 5339|
All IGMP V1 requests : Query General, Join specific group
IGMP_V2.cap (1.3 KB)
|Packets: 18||Duration: 133s||Downloads: 6617|
All IGMP V2 requests : Query General, Query specfic group, Join specific group, leave specific group
stun2.cap (102 bytes)
|Packets: 1||Duration: n/a||Downloads: 3167|
Stun (2) Protocol. UDP Holepunching technique.
packet-c.cap (675.0 KB)
|Packets: 926||Duration: 13s||Downloads: 7226|
This is a packet capture from a SonicWall. We were troubleshooting DHCP packet flows. The SonicWall saw the DHCP Discover and Sent an Offer. We never saw the DHCP acknowledgement. In the adjacent core stacked switching we were running "debug ip dhcp server packets" we only saw discover packets from IP phones up to the SonicWall. For some reason the SonicWall could not let any other DHCP packets through or out of it INSIDE (LAN) interface. Even if we put an ANY-ANY ALC for that interface. We ended up having to replace the SonicWall and upload the configuration from the old SonicWall to the new one.
IPv6_RTSP.cap (15.5 KB)
|Packets: 17||Duration: 3s||Downloads: 4197|
This capture contains IPv6_RTSP packets. Accessed IPv6 enabled RTSP server using 6in4 tunnel.
OCSP-Not_Implemted.cap (1.1 KB)
|Packets: 10||Duration: n/a||Downloads: 5598|
OCSP-Revoked.cap (1.8 KB)
|Packets: 10||Duration: n/a||Downloads: 4441|
OCSP (Comodo - FAKE crt Addons-mozilla-org)
OCSP-Good.cap (3.5 KB)
|Packets: 14||Duration: 1s||Downloads: 5349|
OCSP_Good (CRL HTTPS CA Verisign)
traceroute_MPLS.cap (3.3 KB)
|Packets: 29||Duration: 3s||Downloads: 9832|
cm4116_telnet.cap (9.4 KB)
|Packets: 113||Duration: 14s||Downloads: 7649|
Short Telnet session with an Opengear CM4116 used to demonstrate the urgent flag and pointer
HTTP.cap (24.9 KB)
|Packets: 40||Duration: n/a||Downloads: 12811|
Simple HTTP transfer of a PNG image using wget
DHCP_MessageType 10,11,12 and 13.cap (1.9 KB)
|Packets: 6||Duration: 13s||Downloads: 7909|
Access Concentrator/router queries lease for particular IP addresses using message type as "DHCP LEASE QUERY" and gets response as DHCP LEASE ACTIVE,LEASE UNASSIGNED and LEASE UNKNOWN.
Access Concenttrator/Router IP=10.10.39.14
DHCP server IP=10.10.35.33
iphttps.cap (12.4 KB)
|Packets: 83||Duration: 38s||Downloads: 8480|
IP-HTTPS capture. This is Microsoft's IPv6 inside HTTPS tunneling for DirectAccess.
WCCPv2.pcap.cap (2.8 KB)
|Packets: 15||Duration: 27s||Downloads: 5723|
WCCP communication captures between 7200 Router and a WCCP capable optimization device (In my case it is Riverbed's Stealhead 2050)
TACACS+_encrypted.cap (2.8 KB)
|Packets: 34||Duration: 7s||Downloads: 7111|
TACACS+ authentication and authorization requests as made by a Cisco IOS router upon a user logging in via Telnet.
ICMP_over_L2TPv3_Pseudowire.pcap.cap (5.3 KB)
|Packets: 38||Duration: 30s||Downloads: 7745|
ICMP pings from a CE to a second CE via a L2TPv3 pseudowire.
802.1Q_tunneling.cap (5.0 KB)
|Packets: 26||Duration: 35s||Downloads: 12439|
BGP_MP_NLRI.cap (2.9 KB)
|Packets: 24||Duration: 60s||Downloads: 10175|
IPv6 routes are carried as a separate address family inside MP_REACH_NLRI attributes.
TCP_SACK.cap (27.5 KB)
|Packets: 39||Duration: n/a||Downloads: 16602|
A TCP SACK option is included in packets #31, #33, #35, and #37. The missing segment is retransmitted in packet #38.
4-byte_AS_numbers_Mixed_Scenario.cap (414 bytes)
|Packets: 4||Duration: 60s||Downloads: 6033|
Router "B" (AS 2) at 172.16.3.2 does not support 4-byte AS numbers, while router "A" (AS 10.1 / 655361) at 172.16.3.1 does.
Router "A" receives an UPDATE for the 184.108.40.206/8 subnet from an external router ("D") in the AS 40.1 / 2621441 (not shown), and it forwards it to "B" (pkt n. 2): AS_PATH contains "23456 23456" (the first stands for AS 10.1, the second for the originating AS 40.1), but NEW_AS_PATH contains the real 4-byte AS numbers.
At pkt n. 3 "B" receives the same subnet directly from "D" and sends it to "A", including the original NEW_AS_PATH attribute previously appended by "D".
4-byte_AS_numbers_Full_Support.cap (1.2 KB)
|Packets: 9||Duration: 56s||Downloads: 5550|
Router at 172.16.1.2 (hostname "D", AS 40.1 / 2621441) clears a previous established peering with 172.16.1.1 (hostname "A", AS 10.1 / 655361); They both support 32-bit ASN.
While opening the new session, they negotiate the "Four-octet AS Number Capability" (pkts n. 2 and 3).
Then, both "A" and "D" send some UPDATEs containing 4-octect encoded AS_PATH attributes (pkts n. 6 and 9). Please note: WireShark may show wrong paths unless you force 4-byte encoding in the Preferences / Protocols / BGP options.
rpvstp-access.pcap.cap (3.7 KB)
|Packets: 49||Duration: 77s||Downloads: 5419|
Rapid per-VLAN spanning tree capture of an access port (without portfast), configured in VLAN 5.