This is a preview. You must login to view/edit this pcap.

O 1. 10.64.0.107 » 216.58.197.238 tcp 43804 > 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSV=1119492287 TSER=0 WS=7
O 2. 216.58.197.238 » 10.64.0.107 tcp 443 > 43804 [SYN, ACK] Seq=0 Ack=1 Win=60192 Len=0 MSS=1380 SACK_PERM=1 TSV=2742508704 TSER=1119492287 WS=8
O 3. 10.64.0.107 » 216.58.197.238 tcp 43804 > 443 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSV=1119492319 TSER=2742508704
O 4. 10.64.0.107 » 216.58.197.238 ssl Client Hello
O 5. 216.58.197.238 » 10.64.0.107 tcp 443 > 43804 [RST] Seq=1 Win=0 Len=0

Here are some of things that registered users can do with this pcap:

  • Reorder packets
  • Fragment packets
  • Reassemble TCP streams
  • Rewrite TCP streams (over IPv4 and IPv6)
  • Extract embedded HTTP content
  • Convert any packet into a DoS generator