Skip to content

Instantly share code, notes, and snippets.

@calvin2021y
Created June 23, 2023 06:04
Show Gist options
  • Save calvin2021y/613e7680601c99865d3237b4638991b1 to your computer and use it in GitHub Desktop.
Save calvin2021y/613e7680601c99865d3237b4638991b1 to your computer and use it in GitHub Desktop.
No. Time Source Destination Protocol Length Info
1 0.000000 192.168.128.121 8.8.8.8 TCP 78 47186 → 443 [SYN, ECE, CWR] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=4006011268 TSecr=0 SACK_PERM
Frame 1: 78 bytes on wire (624 bits), 78 bytes captured (624 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 0, Len: 0
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 0 (relative sequence number)
Sequence Number (raw): 3402010144
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 0
Acknowledgment number (raw): 0
1011 .... = Header Length: 44 bytes (11)
Flags: 0x0c2 (SYN, ECE, CWR)
Window: 65535
[Calculated window size: 65535]
Checksum: 0x01ca [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (24 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), Timestamps, SACK permitted, End of Option List (EOL), End of Option List (EOL)
[Timestamps]
No. Time Source Destination Protocol Length Info
2 0.006291 8.8.8.8 192.168.128.121 TCP 74 443 → 47186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1200 SACK_PERM TSval=1614678540 TSecr=4006011268 WS=256
Frame 2: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 0, Ack: 1, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 0 (relative sequence number)
Sequence Number (raw): 2562215323
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 3402010145
1010 .... = Header Length: 40 bytes (10)
Flags: 0x012 (SYN, ACK)
Window: 65535
[Calculated window size: 65535]
Checksum: 0xc3e1 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
3 0.008792 192.168.128.121 8.8.8.8 TCP 66 47186 → 443 [ACK] Seq=1 Ack=1 Win=131840 Len=0 TSval=4006011280 TSecr=1614678540
Frame 3: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 1, Ack: 1, Len: 0
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3402010145
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 2562215324
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 2060
[Calculated window size: 131840]
[Window size scaling factor: 64]
Checksum: 0xe992 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
4 0.057464 192.168.128.121 8.8.8.8 TLSv1.3 352 Client Hello
Frame 4: 352 bytes on wire (2816 bits), 352 bytes captured (2816 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 1, Ack: 1, Len: 286
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 286]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 3402010145
[Next Sequence Number: 287 (relative sequence number)]
Acknowledgment Number: 1 (relative ack number)
Acknowledgment number (raw): 2562215324
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 2060
[Calculated window size: 131840]
[Window size scaling factor: 64]
Checksum: 0xe269 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (286 bytes)
Transport Layer Security
TLSv1.3 Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 281
Handshake Protocol: Client Hello
No. Time Source Destination Protocol Length Info
5 0.064502 8.8.8.8 192.168.128.121 TCP 66 443 → 47186 [ACK] Seq=1 Ack=287 Win=66816 Len=0 TSval=1614678597 TSecr=4006011328
Frame 5: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 1, Ack: 287, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 2562215324
[Next Sequence Number: 1 (relative sequence number)]
Acknowledgment Number: 287 (relative ack number)
Acknowledgment number (raw): 3402010431
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 261
[Calculated window size: 66816]
[Window size scaling factor: 256]
Checksum: 0xef12 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
6 0.064503 8.8.8.8 192.168.128.121 TLSv1.3 133 Hello Retry Request, Change Cipher Spec
Frame 6: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 1, Ack: 287, Len: 67
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 67]
Sequence Number: 1 (relative sequence number)
Sequence Number (raw): 2562215324
[Next Sequence Number: 68 (relative sequence number)]
Acknowledgment Number: 287 (relative ack number)
Acknowledgment number (raw): 3402010431
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 261
[Calculated window size: 66816]
[Window size scaling factor: 256]
Checksum: 0xced5 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (67 bytes)
Transport Layer Security
TLSv1.3 Record Layer: Handshake Protocol: Hello Retry Request
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 56
Handshake Protocol: Hello Retry Request
TLSv1.3 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec
Content Type: Change Cipher Spec (20)
Version: TLS 1.2 (0x0303)
Length: 1
Change Cipher Spec Message
No. Time Source Destination Protocol Length Info
7 0.067548 192.168.128.121 8.8.8.8 TCP 66 47186 → 443 [ACK] Seq=287 Ack=68 Win=131776 Len=0 TSval=4006011337 TSecr=1614678597
Frame 7: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 287, Ack: 68, Len: 0
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 287 (relative sequence number)
Sequence Number (raw): 3402010431
[Next Sequence Number: 287 (relative sequence number)]
Acknowledgment Number: 68 (relative ack number)
Acknowledgment number (raw): 2562215391
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 2059
[Calculated window size: 131776]
[Window size scaling factor: 64]
Checksum: 0xe7c0 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
8 0.112097 192.168.128.121 8.8.8.8 TLSv1.3 319 Client Hello
Frame 8: 319 bytes on wire (2552 bits), 319 bytes captured (2552 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 287, Ack: 68, Len: 253
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 253]
Sequence Number: 287 (relative sequence number)
Sequence Number (raw): 3402010431
[Next Sequence Number: 540 (relative sequence number)]
Acknowledgment Number: 68 (relative ack number)
Acknowledgment number (raw): 2562215391
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 2059
[Calculated window size: 131776]
[Window size scaling factor: 64]
Checksum: 0xe133 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (253 bytes)
Transport Layer Security
TLSv1.3 Record Layer: Handshake Protocol: Client Hello
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 248
Handshake Protocol: Client Hello
No. Time Source Destination Protocol Length Info
9 0.123976 8.8.8.8 192.168.128.121 TCP 66 443 → 47186 [ACK] Seq=68 Ack=540 Win=67840 Len=0 TSval=1614678657 TSecr=4006011382
Frame 9: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 68, Ack: 540, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 68 (relative sequence number)
Sequence Number (raw): 2562215391
[Next Sequence Number: 68 (relative sequence number)]
Acknowledgment Number: 540 (relative ack number)
Acknowledgment number (raw): 3402010684
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xed5c [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
10 0.230020 8.8.8.8 192.168.128.121 TLSv1.3 1254 Server Hello
Frame 10: 1254 bytes on wire (10032 bits), 1254 bytes captured (10032 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 68, Ack: 540, Len: 1188
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 1188]
Sequence Number: 68 (relative sequence number)
Sequence Number (raw): 2562215391
[Next Sequence Number: 1256 (relative sequence number)]
Acknowledgment Number: 540 (relative ack number)
Acknowledgment number (raw): 3402010684
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xaa06 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (1188 bytes)
[Reassembled PDU in frame: 14]
TCP segment data (1093 bytes)
Transport Layer Security
TLSv1.3 Record Layer: Handshake Protocol: Server Hello
Content Type: Handshake (22)
Version: TLS 1.2 (0x0303)
Length: 90
Handshake Protocol: Server Hello
No. Time Source Destination Protocol Length Info
11 0.230022 8.8.8.8 192.168.128.121 TCP 1254 443 → 47186 [ACK] Seq=1256 Ack=540 Win=67840 Len=1188 TSval=1614678763 TSecr=4006011382 [TCP segment of a reassembled PDU]
Frame 11: 1254 bytes on wire (10032 bits), 1254 bytes captured (10032 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 1256, Ack: 540, Len: 1188
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 1188]
Sequence Number: 1256 (relative sequence number)
Sequence Number (raw): 2562216579
[Next Sequence Number: 2444 (relative sequence number)]
Acknowledgment Number: 540 (relative ack number)
Acknowledgment number (raw): 3402010684
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0x6e11 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (1188 bytes)
[Reassembled PDU in frame: 14]
TCP segment data (1188 bytes)
No. Time Source Destination Protocol Length Info
12 0.230023 8.8.8.8 192.168.128.121 TCP 1254 443 → 47186 [PSH, ACK] Seq=2444 Ack=540 Win=67840 Len=1188 TSval=1614678763 TSecr=4006011382 [TCP segment of a reassembled PDU]
Frame 12: 1254 bytes on wire (10032 bits), 1254 bytes captured (10032 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 2444, Ack: 540, Len: 1188
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 1188]
Sequence Number: 2444 (relative sequence number)
Sequence Number (raw): 2562217767
[Next Sequence Number: 3632 (relative sequence number)]
Acknowledgment Number: 540 (relative ack number)
Acknowledgment number (raw): 3402010684
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xf6e5 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (1188 bytes)
[Reassembled PDU in frame: 14]
TCP segment data (1188 bytes)
No. Time Source Destination Protocol Length Info
13 0.230023 8.8.8.8 192.168.128.121 TCP 1254 443 → 47186 [ACK] Seq=3632 Ack=540 Win=67840 Len=1188 TSval=1614678763 TSecr=4006011382 [TCP segment of a reassembled PDU]
Frame 13: 1254 bytes on wire (10032 bits), 1254 bytes captured (10032 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 3632, Ack: 540, Len: 1188
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 1188]
Sequence Number: 3632 (relative sequence number)
Sequence Number (raw): 2562218955
[Next Sequence Number: 4820 (relative sequence number)]
Acknowledgment Number: 540 (relative ack number)
Acknowledgment number (raw): 3402010684
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xfa38 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (1188 bytes)
[Reassembled PDU in frame: 14]
TCP segment data (1188 bytes)
No. Time Source Destination Protocol Length Info
14 0.230024 8.8.8.8 192.168.128.121 TLSv1.3 101 Application Data
Frame 14: 101 bytes on wire (808 bits), 101 bytes captured (808 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 4820, Ack: 540, Len: 35
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 35]
Sequence Number: 4820 (relative sequence number)
Sequence Number (raw): 2562220143
[Next Sequence Number: 4855 (relative sequence number)]
Acknowledgment Number: 540 (relative ack number)
Acknowledgment number (raw): 3402010684
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0x2fc4 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (35 bytes)
TCP segment data (35 bytes)
[5 Reassembled TCP Segments (4692 bytes): #10(1093), #11(1188), #12(1188), #13(1188), #14(35)]
Transport Layer Security
TLSv1.3 Record Layer: Application Data Protocol: Hypertext Transfer Protocol
Opaque Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 4687
Encrypted Application Data: f5fdd2afd4ca80714abc3dbabfb1a836f5cbc9ef93a3b4e8d39affb48cb96ff3b53fa14c…
[Application Data Protocol: Hypertext Transfer Protocol]
No. Time Source Destination Protocol Length Info
15 0.235000 192.168.128.121 8.8.8.8 TCP 66 47186 → 443 [ACK] Seq=540 Ack=4855 Win=126976 Len=0 TSval=4006011505 TSecr=1614678763
Frame 15: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 540, Ack: 4855, Len: 0
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 540 (relative sequence number)
Sequence Number (raw): 3402010684
[Next Sequence Number: 540 (relative sequence number)]
Acknowledgment Number: 4855 (relative ack number)
Acknowledgment number (raw): 2562220178
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 1984
[Calculated window size: 126976]
[Window size scaling factor: 64]
Checksum: 0xd30d [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
16 0.235964 192.168.128.121 8.8.8.8 TCP 66 [TCP Window Update] 47186 → 443 [ACK] Seq=540 Ack=4855 Win=131072 Len=0 TSval=4006011505 TSecr=1614678763
Frame 16: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 540, Ack: 4855, Len: 0
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 540 (relative sequence number)
Sequence Number (raw): 3402010684
[Next Sequence Number: 540 (relative sequence number)]
Acknowledgment Number: 4855 (relative ack number)
Acknowledgment number (raw): 2562220178
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 2048
[Calculated window size: 131072]
[Window size scaling factor: 64]
Checksum: 0xd2cd [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
17 0.237272 192.168.128.121 8.8.8.8 TLSv1.3 90 Application Data
Frame 17: 90 bytes on wire (720 bits), 90 bytes captured (720 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 540, Ack: 4855, Len: 24
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 24]
Sequence Number: 540 (relative sequence number)
Sequence Number (raw): 3402010684
[Next Sequence Number: 564 (relative sequence number)]
Acknowledgment Number: 4855 (relative ack number)
Acknowledgment number (raw): 2562220178
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 2048
[Calculated window size: 131072]
[Window size scaling factor: 64]
Checksum: 0xed9b [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (24 bytes)
Transport Layer Security
TLSv1.3 Record Layer: Application Data Protocol: Hypertext Transfer Protocol
Opaque Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 19
Encrypted Application Data: be5f99105b67c451193095574aebea050415ae
[Application Data Protocol: Hypertext Transfer Protocol]
No. Time Source Destination Protocol Length Info
18 0.237272 192.168.128.121 8.8.8.8 TLSv1.3 90 Application Data
Frame 18: 90 bytes on wire (720 bits), 90 bytes captured (720 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 564, Ack: 4855, Len: 24
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 24]
Sequence Number: 564 (relative sequence number)
Sequence Number (raw): 3402010708
[Next Sequence Number: 588 (relative sequence number)]
Acknowledgment Number: 4855 (relative ack number)
Acknowledgment number (raw): 2562220178
1000 .... = Header Length: 32 bytes (8)
Flags: 0x018 (PSH, ACK)
Window: 2048
[Calculated window size: 131072]
[Window size scaling factor: 64]
Checksum: 0x7b62 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
TCP payload (24 bytes)
Transport Layer Security
TLSv1.3 Record Layer: Application Data Protocol: Hypertext Transfer Protocol
Opaque Type: Application Data (23)
Version: TLS 1.2 (0x0303)
Length: 19
Encrypted Application Data: d880bb91d8c5789d763d95c71ca333252ee6be
[Application Data Protocol: Hypertext Transfer Protocol]
No. Time Source Destination Protocol Length Info
19 0.237272 192.168.128.121 8.8.8.8 TCP 66 47186 → 443 [FIN, ACK] Seq=588 Ack=4855 Win=131072 Len=0 TSval=4006011507 TSecr=1614678763
Frame 19: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 588, Ack: 4855, Len: 0
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 588 (relative sequence number)
Sequence Number (raw): 3402010732
[Next Sequence Number: 589 (relative sequence number)]
Acknowledgment Number: 4855 (relative ack number)
Acknowledgment number (raw): 2562220178
1000 .... = Header Length: 32 bytes (8)
Flags: 0x011 (FIN, ACK)
Window: 2048
[Calculated window size: 131072]
[Window size scaling factor: 64]
Checksum: 0xd29a [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
No. Time Source Destination Protocol Length Info
20 0.243026 8.8.8.8 192.168.128.121 TCP 66 443 → 47186 [ACK] Seq=4855 Ack=564 Win=67840 Len=0 TSval=1614678777 TSecr=4006011507
Frame 20: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 4855, Ack: 564, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 4855 (relative sequence number)
Sequence Number (raw): 2562220178
[Next Sequence Number: 4855 (relative sequence number)]
Acknowledgment Number: 564 (relative ack number)
Acknowledgment number (raw): 3402010708
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xd99c [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
21 0.243027 8.8.8.8 192.168.128.121 TCP 66 443 → 47186 [ACK] Seq=4855 Ack=588 Win=67840 Len=0 TSval=1614678777 TSecr=4006011507
Frame 21: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 4855, Ack: 588, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 4855 (relative sequence number)
Sequence Number (raw): 2562220178
[Next Sequence Number: 4855 (relative sequence number)]
Acknowledgment Number: 588 (relative ack number)
Acknowledgment number (raw): 3402010732
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xd984 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
22 0.243028 8.8.8.8 192.168.128.121 TCP 66 443 → 47186 [FIN, ACK] Seq=4855 Ack=589 Win=67840 Len=0 TSval=1614678777 TSecr=4006011507
Frame 22: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 4855, Ack: 589, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 4855 (relative sequence number)
Sequence Number (raw): 2562220178
[Next Sequence Number: 4856 (relative sequence number)]
Acknowledgment Number: 589 (relative ack number)
Acknowledgment number (raw): 3402010733
1000 .... = Header Length: 32 bytes (8)
Flags: 0x011 (FIN, ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xd982 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
23 0.243093 8.8.8.8 192.168.128.121 TCP 66 443 → 47186 [RST, ACK] Seq=4856 Ack=589 Win=67840 Len=0 TSval=1614678777 TSecr=4006011507
Frame 23: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 4856, Ack: 589, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 4856 (relative sequence number)
Sequence Number (raw): 2562220179
[Next Sequence Number: 4856 (relative sequence number)]
Acknowledgment Number: 589 (relative ack number)
Acknowledgment number (raw): 3402010733
1000 .... = Header Length: 32 bytes (8)
Flags: 0x014 (RST, ACK)
Window: 265
[Calculated window size: 67840]
[Window size scaling factor: 256]
Checksum: 0xd97e [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
No. Time Source Destination Protocol Length Info
24 0.247202 192.168.128.121 8.8.8.8 TCP 66 47186 → 443 [ACK] Seq=589 Ack=4856 Win=131072 Len=0 TSval=4006011518 TSecr=1614678777
Frame 24: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface en0, id 0
Ethernet II, Src: Apple_05:34:c0 (3c:7d:0a:05:34:c0), Dst: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54)
Internet Protocol Version 4, Src: 192.168.128.121, Dst: 8.8.8.8
Transmission Control Protocol, Src Port: 47186, Dst Port: 443, Seq: 589, Ack: 4856, Len: 0
Source Port: 47186
Destination Port: 443
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 589 (relative sequence number)
Sequence Number (raw): 3402010733
[Next Sequence Number: 589 (relative sequence number)]
Acknowledgment Number: 4856 (relative ack number)
Acknowledgment number (raw): 2562220179
1000 .... = Header Length: 32 bytes (8)
Flags: 0x010 (ACK)
Window: 2048
[Calculated window size: 131072]
[Window size scaling factor: 64]
Checksum: 0xd280 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
[Timestamps]
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length Info
25 0.252840 8.8.8.8 192.168.128.121 TCP 60 443 → 47186 [RST] Seq=4856 Win=0 Len=0
Frame 25: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on interface en0, id 0
Ethernet II, Src: BeijingX_4c:fe:54 (28:d1:27:4c:fe:54), Dst: Apple_05:34:c0 (3c:7d:0a:05:34:c0)
Internet Protocol Version 4, Src: 8.8.8.8, Dst: 192.168.128.121
Transmission Control Protocol, Src Port: 443, Dst Port: 47186, Seq: 4856, Len: 0
Source Port: 443
Destination Port: 47186
[Stream index: 0]
[Conversation completeness: Complete, WITH_DATA (63)]
[TCP Segment Len: 0]
Sequence Number: 4856 (relative sequence number)
Sequence Number (raw): 2562220179
[Next Sequence Number: 4856 (relative sequence number)]
Acknowledgment Number: 0
Acknowledgment number (raw): 0
0101 .... = Header Length: 20 bytes (5)
Flags: 0x004 (RST)
Window: 0
[Calculated window size: 0]
[Window size scaling factor: 256]
Checksum: 0xab55 [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
[Timestamps]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment