Created
July 22, 2019 15:05
-
-
Save zaharidichev/9810eee6dd78d8c600f881cb6b9a1dd0 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Frame 13476: 289 bytes on wire (2312 bits), 289 bytes captured (2312 bits) on interface 0 | |
Interface id: 0 (en0) | |
Interface name: en0 | |
Interface description: Wi-Fi | |
Encapsulation type: Ethernet (1) | |
Arrival Time: Jul 22, 2019 17:44:23.327968000 EEST | |
[Time shift for this packet: 0.000000000 seconds] | |
Epoch Time: 1563806663.327968000 seconds | |
[Time delta from previous captured frame: 0.008329000 seconds] | |
[Time delta from previous displayed frame: 106.774281000 seconds] | |
[Time since reference or first frame: 676.255728000 seconds] | |
Frame Number: 13476 | |
Frame Length: 289 bytes (2312 bits) | |
Capture Length: 289 bytes (2312 bits) | |
[Frame is marked: False] | |
[Frame is ignored: False] | |
[Protocols in frame: eth:ethertype:ip:tcp:tls] | |
[Coloring Rule Name: TCP] | |
[Coloring Rule String: tcp] | |
Ethernet II, Src: Apple_cf:8c:5d (c4:b3:01:cf:8c:5d), Dst: Smartcom_76:95:ee (50:a9:de:76:95:ee) | |
Destination: Smartcom_76:95:ee (50:a9:de:76:95:ee) | |
Address: Smartcom_76:95:ee (50:a9:de:76:95:ee) | |
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) | |
.... ...0 .... .... .... .... = IG bit: Individual address (unicast) | |
Source: Apple_cf:8c:5d (c4:b3:01:cf:8c:5d) | |
Address: Apple_cf:8c:5d (c4:b3:01:cf:8c:5d) | |
.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) | |
.... ...0 .... .... .... .... = IG bit: Individual address (unicast) | |
Type: IPv4 (0x0800) | |
Internet Protocol Version 4, Src: 192.168.1.5, Dst: 119.9.43.241 | |
0100 .... = Version: 4 | |
.... 0101 = Header Length: 20 bytes (5) | |
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) | |
0000 00.. = Differentiated Services Codepoint: Default (0) | |
.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) | |
Total Length: 275 | |
Identification: 0x0000 (0) | |
Flags: 0x4000, Don't fragment | |
0... .... .... .... = Reserved bit: Not set | |
.1.. .... .... .... = Don't fragment: Set | |
..0. .... .... .... = More fragments: Not set | |
...0 0000 0000 0000 = Fragment offset: 0 | |
Time to live: 64 | |
Protocol: TCP (6) | |
Header checksum: 0xd53d [validation disabled] | |
[Header checksum status: Unverified] | |
Source: 192.168.1.5 | |
Destination: 119.9.43.241 | |
Transmission Control Protocol, Src Port: 60370, Dst Port: 443, Seq: 1, Ack: 1, Len: 223 | |
Source Port: 60370 | |
Destination Port: 443 | |
[Stream index: 190] | |
[TCP Segment Len: 223] | |
Sequence number: 1 (relative sequence number) | |
[Next sequence number: 224 (relative sequence number)] | |
Acknowledgment number: 1 (relative ack number) | |
1000 .... = Header Length: 32 bytes (8) | |
Flags: 0x018 (PSH, ACK) | |
000. .... .... = Reserved: Not set | |
...0 .... .... = Nonce: Not set | |
.... 0... .... = Congestion Window Reduced (CWR): Not set | |
.... .0.. .... = ECN-Echo: Not set | |
.... ..0. .... = Urgent: Not set | |
.... ...1 .... = Acknowledgment: Set | |
.... .... 1... = Push: Set | |
.... .... .0.. = Reset: Not set | |
.... .... ..0. = Syn: Not set | |
.... .... ...0 = Fin: Not set | |
[TCP Flags: ·······AP···] | |
Window size value: 2058 | |
[Calculated window size: 131712] | |
[Window size scaling factor: 64] | |
Checksum: 0xfed0 [unverified] | |
[Checksum Status: Unverified] | |
Urgent pointer: 0 | |
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps | |
TCP Option - No-Operation (NOP) | |
Kind: No-Operation (1) | |
TCP Option - No-Operation (NOP) | |
Kind: No-Operation (1) | |
TCP Option - Timestamps: TSval 607860250, TSecr 2381472042 | |
Kind: Time Stamp Option (8) | |
Length: 10 | |
Timestamp value: 607860250 | |
Timestamp echo reply: 2381472042 | |
[SEQ/ACK analysis] | |
[iRTT: 0.392048000 seconds] | |
[Bytes in flight: 223] | |
[Bytes sent since last PSH flag: 223] | |
[Timestamps] | |
[Time since first frame in this TCP stream: 0.400377000 seconds] | |
[Time since previous frame in this TCP stream: 0.008329000 seconds] | |
TCP payload (223 bytes) | |
Transport Layer Security | |
TLSv1.2 Record Layer: Handshake Protocol: Client Hello | |
Content Type: Handshake (22) | |
Version: TLS 1.0 (0x0301) | |
Length: 218 | |
Handshake Protocol: Client Hello | |
Handshake Type: Client Hello (1) | |
Length: 214 | |
Version: TLS 1.2 (0x0303) | |
Random: fdd611dfef42171222a3b3e9dcc0cdba133eb000eb26db19… | |
GMT Unix Time: Dec 14, 2104 04:28:47.000000000 EET | |
Random Bytes: ef42171222a3b3e9dcc0cdba133eb000eb26db192bf14c7c… | |
Session ID Length: 0 | |
Cipher Suites Length: 84 | |
Cipher Suites (42 suites) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8) | |
Cipher Suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xccaa) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) | |
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f) | |
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b) | |
Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039) | |
Cipher Suite: Unknown (0xff85) | |
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0x00c4) | |
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0088) | |
Cipher Suite: TLS_GOSTR341001_WITH_28147_CNT_IMIT (0x0081) | |
Cipher Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d) | |
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d) | |
Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) | |
Cipher Suite: TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (0x00c0) | |
Cipher Suite: TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0084) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009) | |
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e) | |
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067) | |
Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033) | |
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0x00be) | |
Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0045) | |
Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c) | |
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c) | |
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) | |
Cipher Suite: TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (0x00ba) | |
Cipher Suite: TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0041) | |
Cipher Suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012) | |
Cipher Suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008) | |
Cipher Suite: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x0016) | |
Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) | |
Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff) | |
Compression Methods Length: 1 | |
Compression Methods (1 method) | |
Compression Method: null (0) | |
Extensions Length: 89 | |
Extension: server_name (len=17) | |
Type: server_name (0) | |
Length: 17 | |
Server Name Indication extension | |
Server Name list length: 15 | |
Server Name Type: host_name (0) | |
Server Name length: 12 | |
Server Name: www.mnot.net | |
Extension: ec_point_formats (len=2) | |
Type: ec_point_formats (11) | |
Length: 2 | |
EC point formats Length: 1 | |
Elliptic curves point formats (1) | |
EC point format: uncompressed (0) | |
Extension: supported_groups (len=8) | |
Type: supported_groups (10) | |
Length: 8 | |
Supported Groups List Length: 6 | |
Supported Groups (3 groups) | |
Supported Group: x25519 (0x001d) | |
Supported Group: secp256r1 (0x0017) | |
Supported Group: secp384r1 (0x0018) | |
Extension: signature_algorithms (len=28) | |
Type: signature_algorithms (13) | |
Length: 28 | |
Signature Hash Algorithms Length: 26 | |
Signature Hash Algorithms (13 algorithms) | |
Signature Algorithm: rsa_pkcs1_sha512 (0x0601) | |
Signature Hash Algorithm Hash: SHA512 (6) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_secp521r1_sha512 (0x0603) | |
Signature Hash Algorithm Hash: SHA512 (6) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: Unknown Unknown (0xefef) | |
Signature Hash Algorithm Hash: Unknown (239) | |
Signature Hash Algorithm Signature: Unknown (239) | |
Signature Algorithm: rsa_pkcs1_sha384 (0x0501) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_secp384r1_sha384 (0x0503) | |
Signature Hash Algorithm Hash: SHA384 (5) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: rsa_pkcs1_sha256 (0x0401) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_secp256r1_sha256 (0x0403) | |
Signature Hash Algorithm Hash: SHA256 (4) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: Unknown Unknown (0xeeee) | |
Signature Hash Algorithm Hash: Unknown (238) | |
Signature Hash Algorithm Signature: Unknown (238) | |
Signature Algorithm: Unknown Unknown (0xeded) | |
Signature Hash Algorithm Hash: Unknown (237) | |
Signature Hash Algorithm Signature: Unknown (237) | |
Signature Algorithm: SHA224 RSA (0x0301) | |
Signature Hash Algorithm Hash: SHA224 (3) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: SHA224 ECDSA (0x0303) | |
Signature Hash Algorithm Hash: SHA224 (3) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Signature Algorithm: rsa_pkcs1_sha1 (0x0201) | |
Signature Hash Algorithm Hash: SHA1 (2) | |
Signature Hash Algorithm Signature: RSA (1) | |
Signature Algorithm: ecdsa_sha1 (0x0203) | |
Signature Hash Algorithm Hash: SHA1 (2) | |
Signature Hash Algorithm Signature: ECDSA (3) | |
Extension: application_layer_protocol_negotiation (len=14) | |
Type: application_layer_protocol_negotiation (16) | |
Length: 14 | |
ALPN Extension Length: 12 | |
ALPN Protocol | |
ALPN string length: 2 | |
ALPN Next Protocol: h2 | |
ALPN string length: 8 | |
ALPN Next Protocol: http/1.1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment