Category : wireshark

I created a simple program to send strings from client on my PC to server on a different device. I am using the code below for it. host = ‘192.168.1.105’ portNumb = 5000 data="hello world" soc=socket.socket(socket.AF_INET,socket.SOCK_STREAM) context=ssl.SSLContext(ssl.PROTOCOL_TLSv1_2) sslConn=context.wrap_socket(soc) sslConn.connect((host,portNumb)) sslConn.send(data.encode()) When I checked in wireshark logs, the client is sending the string but closes the ..

Read more

We want to automatically extract useful information like images, binary files, indicators of compromise from pcap and logs into a new file and this is the code that we’ve found and tweaked a little bit so far import sys import os import subprocess inputdir = "/home/kali/ezlog" with open("outfile.txt","w") as outfile: for pcapFilename in os.listdir(inputdir): if ..

Read more

I am looking to reverse engineer a BLE device using Python Bleak. I ran the HCI Snoop logs through Wireshark and would like to replicate this call that my phone makes to the device. Is it possible based on the below Wireshark output? Wireshark produces the below bytes from the above hex x02x40x00x0fx00x0bx00x04x00x52x19x00xa5x5ax00x08xe0xe8x0dx0a I have ..

Read more