This is a preview. You must login to view/edit this pcap.

O 1. 10.0.1.101 » 10.0.2.102 nbss NBSS Continuation Message
O 2. 10.0.2.102 » 10.0.1.101 tcp 1369 > 445 [ACK] Seq=1 Ack=2 Win=64279 Len=0
O 3. 10.0.2.1 » 224.0.0.103 udp Source port: 1035 Destination port: 3235
O 4. 10.0.1.101 » 10.0.2.102 tcp 445 > 1369 [RST, ACK] Seq=2 Ack=1 Win=0 Len=0
O 5. 10.0.2.1 » 10.0.2.102 tcp 2773 > 445 [SYN] Seq=0 Win=16384 Len=0 MSS=1460

Here are some of things that registered users can do with this pcap:

  • Reorder packets
  • Fragment packets
  • Reassemble TCP streams
  • Rewrite TCP streams (over IPv4 and IPv6)
  • Extract embedded HTTP content
  • Convert any packet into a DoS generator