Created
July 22, 2019 15:03
-
-
Save zaharidichev/2e3f817c1e6c2869fb1dbe36e6dafb1d to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Frame 12726: 204 bytes on wire (1632 bits), 204 bytes captured (1632 bits) on interface 0 | |
Interface id: 0 (en0) | |
Interface name: en0 | |
Interface description: Wi-Fi | |
Encapsulation type: Ethernet (1) | |
Arrival Time: Jul 22, 2019 17:42:36.553687000 EEST | |
[Time shift for this packet: 0.000000000 seconds] | |
Epoch Time: 1563806556.553687000 seconds | |
[Time delta from previous captured frame: 0.001019000 seconds] | |
[Time delta from previous displayed frame: 0.000000000 seconds] | |
[Time since reference or first frame: 569.481447000 seconds] | |
Frame Number: 12726 | |
Frame Length: 204 bytes (1632 bits) | |
Capture Length: 204 bytes (1632 bits) | |
[Frame is marked: False] | |
[Frame is ignored: False] | |
[Protocols in frame: eth:ethertype:ip:tcp:tls] | |
[Coloring Rule Name: TCP] | |
[Coloring Rule String: tcp] | |
Ethernet II, Src: Apple_cf:8c:5d (c4:b3:01:cf:8c:5d), Dst: Smartcom_76:95:ee (50:a9:de:76:95:ee) | |
Destination: Smartcom_76:95:ee (50:a9:de:76:95:ee) | |
Address: Smartcom_76:95:ee (50:a9:de:76:95:ee) | |
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) | |
.... ...0 .... .... .... .... = IG bit: Individual address (unicast) | |
Source: Apple_cf:8c:5d (c4:b3:01:cf:8c:5d) | |
Address: Apple_cf:8c:5d (c4:b3:01:cf:8c:5d) | |
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) | |
.... ...0 .... .... .... .... = IG bit: Individual address (unicast) | |
Type: IPv4 (0x0800) | |
Internet Protocol Version 4, Src: 192.168.1.5, Dst: 119.9.43.241 | |
0100 .... = Version: 4 | |
.... 0101 = Header Length: 20 bytes (5) | |
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) | |
0000 00.. = Differentiated Services Codepoint: Default (0) | |
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) | |
Total Length: 190 | |
Identification: 0x0000 (0) | |
Flags: 0x4000, Don't fragment | |
0... .... .... .... = Reserved bit: Not set | |
.1.. .... .... .... = Don't fragment: Set | |
..0. .... .... .... = More fragments: Not set | |
...0 0000 0000 0000 = Fragment offset: 0 | |
Time to live: 64 | |
Protocol: TCP (6) | |
Header checksum: 0xd592 [validation disabled] | |
[Header checksum status: Unverified] | |
Source: 192.168.1.5 | |
Destination: 119.9.43.241 | |
Transmission Control Protocol, Src Port: 60365, Dst Port: 443, Seq: 1, Ack: 1, Len: 138 | |
Source Port: 60365 | |
Destination Port: 443 | |
[Stream index: 185] | |
[TCP Segment Len: 138] | |
Sequence number: 1 (relative sequence number) | |
[Next sequence number: 139 (relative sequence number)] | |
Acknowledgment number: 1 (relative ack number) | |
1000 .... = Header Length: 32 bytes (8) | |
Flags: 0x018 (PSH, ACK) | |
000. .... .... = Reserved: Not set | |
...0 .... .... = Nonce: Not set | |
.... 0... .... = Congestion Window Reduced (CWR): Not set | |
.... .0.. .... = ECN-Echo: Not set | |
.... ..0. .... = Urgent: Not set | |
.... ...1 .... = Acknowledgment: Set | |
.... .... 1... = Push: Set | |
.... .... .0.. = Reset: Not set | |
.... .... ..0. = Syn: Not set | |
.... .... ...0 = Fin: Not set | |
[TCP Flags: ·······AP···] | |
Window size value: 2058 | |
[Calculated window size: 131712] | |
[Window size scaling factor: 64] | |
Checksum: 0x73c2 [unverified] | |
[Checksum Status: Unverified] | |
Urgent pointer: 0 | |
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps | |
TCP Option - No-Operation (NOP) | |
Kind: No-Operation (1) | |
TCP Option - No-Operation (NOP) | |
Kind: No-Operation (1) | |
TCP Option - Timestamps: TSval 607753885, TSecr 2381365348 | |
Kind: Time Stamp Option (8) | |
Length: 10 | |
Timestamp value: 607753885 | |
Timestamp echo reply: 2381365348 | |
[SEQ/ACK analysis] | |
[iRTT: 0.316257000 seconds] | |
[Bytes in flight: 138] | |
[Bytes sent since last PSH flag: 138] | |
[Timestamps] | |
[Time since first frame in this TCP stream: 0.317276000 seconds] | |
[Time since previous frame in this TCP stream: 0.001019000 seconds] | |
TCP payload (138 bytes) | |
Transport Layer Security | |
TLSv1.2 Record Layer: Handshake Protocol: Client Hello | |
Content Type: Handshake (22) | |
Version: TLS 1.0 (0x0301) | |
Length: 133 | |
Handshake Protocol: Client Hello | |
Handshake Type: Client Hello (1) | |
Length: 129 | |
Version: TLS 1.2 (0x0303) | |
Random: f34b93fc80019b9675dc530ee462104ecd5093a3e4360dad… | |
GMT Unix Time: May 7, 2099 08:56:12.000000000 EEST | |
Random Bytes: 80019b9675dc530ee462104ecd5093a3e4360dadefc9822f… | |
Session ID Length: 0 | |
Cipher Suites Length: 16 | |
Cipher Suites (8 suites) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) | |
Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c) | |
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) | |
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) | |
Compression Methods Length: 1 | |
Compression Methods (1 method) | |
Compression Method: null (0) | |
Extensions Length: 72 | |
Extension: renegotiation_info (len=1) | |
Type: renegotiation_info (65281) | |
Length: 1 | |
Renegotiation Info extension | |
Renegotiation info extension length: 0 | |
Extension: server_name (len=17) | |
Type: server_name (0) | |
Length: 17 | |
Server Name Indication extension | |
Server Name list length: 15 | |
Server Name Type: host_name (0) | |
Server Name length: 12 | |
Server Name: www.mnot.net | |
Extension: extended_master_secret (len=0) | |
Type: extended_master_secret (23) | |
Length: 0 | |
Extension: signature_algorithms (len=20) | |
Type: signature_algorithms (13) | |
Length: 20 | |
Signature Hash Algorithms Length: 18 | |
Signature Hash Algorithms (9 algorithms) | |
Signature Algorithm: ecdsa_secp256r1_sha256 (0x0403) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: rsa_pss_rsae_sha256 (0x0804) | |
Signature Hash Algorithm Hash: Unknown (8) | |
Signature Hash Algorithm Signature: Unknown (4) | |
Signature Algorithm: rsa_pkcs1_sha256 (0x0401) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_secp384r1_sha384 (0x0503) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: rsa_pss_rsae_sha384 (0x0805) | |
Signature Hash Algorithm Hash: Unknown (8) | |
Signature Hash Algorithm Signature: Unknown (5) | |
Signature Algorithm: rsa_pkcs1_sha384 (0x0501) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: rsa_pss_rsae_sha512 (0x0806) | |
Signature Hash Algorithm Hash: Unknown (8) | |
Signature Hash Algorithm Signature: Unknown (6) | |
Signature Algorithm: rsa_pkcs1_sha512 (0x0601) | |
Signature Hash Algorithm Hash: SHA512 (6) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: rsa_pkcs1_sha1 (0x0201) | |
Signature Hash Algorithm Hash: SHA1 (2) | |
Signature Hash Algorithm Signature: RSA (1) | |
Extension: ec_point_formats (len=2) | |
Type: ec_point_formats (11) | |
Length: 2 | |
EC point formats Length: 1 | |
Elliptic curves point formats (1) | |
EC point format: uncompressed (0) | |
Extension: supported_groups (len=8) | |
Type: supported_groups (10) | |
Length: 8 | |
Supported Groups List Length: 6 | |
Supported Groups (3 groups) | |
Supported Group: x25519 (0x001d) | |
Supported Group: secp256r1 (0x0017) | |
Supported Group: secp384r1 (0x0018) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment