I need help to understand the red and black errors in Wireshark (see the attached screenshot). Those errors are produced when I try to access a large PDF file hosted in a static folder on IIS.
My knowledge of TCP protocols is very limit. Any help is really appreciated!
Related
been searching for hours, but can't solve it. I am trying to replicate a packet sent by a windows application to speed up a task however I cannot understand the payload structure for the server to accept it.
I attached an image below. Is there any way to see what structure I'm sending the data- so I can replicate with new info and encrypt to md5
New to this and Wireshark. I appreciate any guidance I could get.
Or to be told it's not possible.
Take care, thanks in advance.
Hi Guys,
I'm working with a friend on network protocol simulation with ns-2,I'm new to this environment and facing some difficulties.
The one tutorial I used did this for the Westwood protocol, so I'll include my errors for that one just because it's a little simpler.
This is the guide I followed:
http://web.cs.ucla.edu/~nrl/hpi/tcpw/tcpw_ns2/tcp-westwood-ns2.html
Outline of steps:
Add tcp-westwood.cc & tcp-westwood.h files to tcp folder in
the main ns2 directory (ns-2.35)
Edit the makefile to include tcp-westwood.o file (within the obj_cc variable).
Add the appropriate lines to ns-default.tcl file (see link)
Recompile (recompile steps: go to ns-2.35 directory; type "./configure"; type
"make")
Goal:
To try out TCP Westwood protocol (a third party protocol source code) in ns-2 to simulate some network scenarios.
Problem:
When I run test.tcl using the Reno tcp protocol I get no errors. But when I change the line "set tcp [new Agent/TCP/Reno" to "set tcp [new Agent/TCP/Westwood" in the test.tcl file, I get the output from the screen shot (see attached).
I have upload code files here on google drive.
Any help or tip will be greatly appreciated.
OS : Ubuntu 14.04
ion : 3.2.2
In my current setup, I am using gstreamer utility to stream live video.
The system has Ip address of 192.168.58.10( say for example). I am streaming it to another machine say 192.168.58.12 port 5000.
From 2nd machine I want to use Ion-dtn to stream it to different endpoints. I am completely clueless how to proceed.
I have done bit of research and found that bssStreamingApp utility and bsspadmin can do it but I failed to find any examples. Can some one please advice me. Earlier I have integrated bpsource in my application to send messages or text stream and it was quite successful.
Thanks in advance for help or any criticism
I would like to develop a little daemon software that will be run on a Windows computer.
I am trying to know if a 3D printer connected through the network (TCP/IP assigned through DHCP) is currently printing, or is it idle.
I believe the fact that it's a 3D Printer is of little interest here, and the same would apply to a regular inkjet/laser network printer.
I have some background in TCP/IP, Networking but very little knowledge about drivers and devices status querying.
Is there anyway to identify packets from a specific device inside the network?
Is this the way to go (listening to packets passing through the network), or is there an easier way?
Thanks a lot for your help.
Not sure if this will help, but OctoPrint (http://octoprint.org) gives you a web based interface for your 3d printer. Then you could pretty easily scrap the web page to see if it's busy or not, and you just need to be able to make an HTTP connection and parse HTML. That might be an easier path.
I have a program on my iPad that makes a direct TCP connection (bypassing the HTTP proxy settings in the Settings menu). I have been tasked to debug this, but I've been unable to find a way to capture the data stream (and the guy who compiles the program is not very responsive).
So... I've been trying to set my wlan to "no encryption at all", booting up Kali, putting the wlan interface into monitoring mode (airmon-ng start wlan0). Then started Wireshark & tried sniffing on both mon0 & wlan0. Neither did really result into anything useful.
That's what I did till now, but I'm out of ideas.
Does anyone know what way I can do it? (preferably even using Windows?)
What I want to get in the end is a pcap file (so I can look at it in Wireshark) of the data traffic. I'm not interested in the packets per se, but in the raw data transfer of the application.
Thanks!
Use another Laptop (Windows or Linux, your choice) with WLAN card in Promiscuous mode, which will sit besides your iPad and capture all the packets on air.
Check this for more details.
What I finally did: I own an Android telephone which could be rooted (and installed "Shark for Root"). So, I enabled a hotspot, connected my iPad to it, and dumped the traffic that way. Weird thing though is that I had to reboot my device to be able to download the pcap file to my computer. It could be read on the device by SharkReader though without reboot.
bitShark is another option, and looks much more nice, but I prefer the simpler interface of Shark for Root.