Packet capture analysis of pop3 by Wireshark

This paper mainly uses Wireshark to analyze the process of receiving e-mail by using POP3 protocol, and uses telnet command for simple operation. 1. POP3 introduction Post Office Protocol (English: Post Office Protocol, abbreviation: pop) is a member of TCP/IP protocol family and is defined by RFC 1939. This protocol is mainly used to suppo ...

Added by benzrf on Fri, 25 Feb 2022 11:35:18 +0200

Wireshark TS | Ping Google DNS 8.8.8.8 special result resolution

preface In a word, Google DNS 8.8.8.8 will truncate the packet length of Ping response, and there will be different results on the system, but Wireshark packet capture results will show that Ping is not responding. ​ 163 example Start with www.163 Com as an example, Windows defaults to Ping, and the data length is 32. $ ping www.163.com I ...

Added by eraxian on Mon, 10 Jan 2022 14:53:54 +0200

Deploy rtl88xx driver / rpcapd to support wireshark to catch Wifi packets remotely

Kali Linux only does penetration testing in the LAN, which is a little overqualified. Perhaps the long-distance penetration of aircraft with the wind can better reflect its original intention (strong concealment, maybe no trace!). To realize this idea, we need to solve a core problem: how to capture the network traffic of remote LAN? This probl ...

Added by jv2222 on Sun, 09 Jan 2022 18:11:40 +0200

Game client programming

Game client programming IDE: Visual Studio 2019 System: Windows10 C# version: 8.0 Write an online game client. The campus intranet IP address of the game server is 10.1.230.74, the port is 3900, and TCP connection is adopted. After the connection is successful, the messages sent by the server can be continuously displayed in ...

Added by Cless on Tue, 30 Nov 2021 19:33:00 +0200

wireshark: hexadecimal dump

What is hexadecimal dump On a computer, a hexadecimal dump is a hexadecimal view of the computer's data (on screen or paper), either from RAM or from a file or storage deviceViewing hexadecimal data dumps is usually done as part of debugging or reverse engineering.In a hexadecimal dump, each byte (8 bits) is represented as a two-digit hexadeci ...

Added by the DtTvB on Fri, 26 Nov 2021 20:05:27 +0200