Release date:Updated on: 2012-12-09
Affected Systems:Wireshark 1.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2012-6052
Wireshark (formerly known as Ethereal) is a very popular open-source network traffic analysis software.
Wireshark has a security vulnerability when processing multiple pcap-ng format files, which can cause leakage of Sensitive Host name resolution information.
Link
Pcap, the packet Capture library, grabs the package library and provides a high-level interface to the capture system. All packets on the network, even those sent to other hosts, can be captured through this mechanism. It also supports saving captured packets as local files and reading information from local files. There are a few more details to refer to: http://baike.baidu.com/view/6584893.htm Some introductions of Libpcap, http://baike.baidu.com/v
Demand:1. Read the PCAP message captured by Wireshark2. Filter out specific messages3, analysis of the interval between the specific message is consistent with the lawKey function or variable:Rdpcap ()Filter (): Using a lambda functionP.timeLS () can be used to check the text of the supported fields, because the link layer and the IP layer with the field is repeated, you may use P[IP].SRC to represent the IP source address, type is a string.P.load rep
.
For definitions, see http :\\
3. Block length (16 bit)
The block length includes chunk type, Chunk flags, Chunk length, and Chunk value.
4. Block Value (variable length)
The block value content transmits the actual information in the block. The content is determined by the message block type. The length of the block value is not long.Sctp struct Definition
// Sctp header typedef struct _ sctp_header {_ int16 srcport; _ int16 dstport; _ int32 ivertag; _ int32 ichecksum;} _ sctpheader; // chunk
Pcap file format Analysis
I. Basic Format:File header data packet ......
Ii. File Header structure:Sturct pcap_file_header {DWORD magic; Word version_major; Word version_minor; DWORD thiszone; DWORD sigfigs; DWORD snaplen; DWORD linktype;} Description: 1. identifier: 32-bit, the value of this flag is 0xa1b2c3d4 in hexadecimal notation. A 32-bit magic number, the magic number has the value hex a1b2c3d4.2, Master version number: 16 bits, default value:
Wireshark is a network protocol analysis tool in windows/linux. Wireshark 1.4.1-1.4.4 has a buffer overflow vulnerability when processing pcap files, which may cause arbitrary code execution. Wireshark 1.4.5 fixes this security issue.
[+] Info:~~~~~~~~~Wireshark 1.4.1-1.4.4 SEH Overflow Exploit
[+] Poc:~~~~~~~~~
View sourceprint? 1 #! /Usr/bin/env python
Import "> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838
Note: Based on lucene5.5.x version One, simple introduction of IK Analyzer
IK Analyzer is linliangyi2007 's work, and then thanks for his blog address:http://linliangyi2007.iteye.com/
IK Analyzer supports two participle, one is the most fine-grained participle (recommended use, IK default to use the most fine-grained), there is a kind of intelligent participle (
Use the Api analyzer and the Windows compatibility package to write smart cross-platform. NET Core applications. The api Analyzer
This article is translated from Scott Hanselman's blog:
Https://www.hanselman.com/blog/WritingSmarterCrossplatformNETCoreAppsWithTheAPIAnalyzerAndWindowsCompatibilityPack.aspx
Body:
This is a pair of excellent. Net Core tools you should know in recent weeks. They are very helpf
SharePoint configuration analyzer (sca.exe)-SharePointConfiguration Analyzer
Translated by: Rickie Lee (rickieleemail at Yahoo.com)
Jan. 1, 2005
Overview
SharePoint configuration analyzer is a diagnostic tool used to verify running WSS or SPS and some key settings that host Web parts. SharePoint configuration analyz
3.2.5.9 write a lexical analyzer, 3.2.5.9 lexical analyzer
The Lexical analyzer or scanner is mainly used to analyze the text of a string, and then analyze the words in the text to identify it as a certain type of attribute. The first step in writing a compiler or parser is to do this: lexical analysis. In the past, there were many methods to use string search. H
Spectrum Analyzer is the use of frequency domain to analyze and study the signal of a measuring instrument, for signal analysis it is indispensable, with the rapid development of communication technology, more and more field operations need to support the spectrum instrument (Spectrum Analyzer type), such as communication transmitters and interference signal measurement, spectrum monitoring, The characteris
Analyzer error (view. aspx in the browser), analyzer. aspxAnalyzer error Description: An error occurred while analyzing the resources required to provide services to this request. Check the following specific analysis error details and modify the analyzer error message as appropriate: The type "StockManageWebService. Service1" cannot be created ".Source error:Row
Detailed explanation of Yahoo's MySQL Performance Analyzer, yahoomysql AnalyzerDetailed explanation of Yahoo's MySQL Performance Analyzer Author: chszs, reprinted to be noted. Blog homepage: http://blog.csdn.net/chszs一、introduction
Yahoo opened its MySQL Performance Analyzer on the previous day and its source code is hosted on GitHub. This performance
Analyzer Error
Note:An error occurred while analyzing the resources required to provide services to this request. Check the following detailed analysis error information and modify the source file as appropriate.Weifang Health Network: www.0536jk.comAnalyzer error message:The type "websystem. Global" is not clear: it may come fromProgramSet "E: \ websystem \ bin \ websystem. DLL or assembly c: \ windows \ Microsoft. net \ framework \ v2.0.50727 \ te
Linux-solr-how to configure a Chinese analyzer tutorial, linux-solr Analyzer
The principle of the Chinese analyzer is that the user gives solr a lot of information and finds the information you want after query. The part that inputs all information is called an index or update. In Solr, a document consists of fields. You can specify the field type to indicate the
Now the core of the DFA has been successfully constructed, the final step is based on the DFA to obtain a complete lexical analyzer.
Since it is not yet possible to support a lexical definition file like Flex, you still need to define the rules in your program and not be very flexible in customizing the lexical analyzer, but the basics are sufficient.
Definition of lexical rules
All the rules used by the
Database Query analyzer 6.03: How to Operate Domestic DM databases flexibly and quickly, db6.03
Database Query analyzer 6.03: How to Operate Domestic DM databases flexibly and quickly
Magenfeng
(Guangdong Union Electronic Service Co., Ltd., Guangzhou 510300, China)
SummaryThis article describes in detail how to flexibly and quickly operate domestic DM databases in the "universal database Query
35. use SQL query analyzer and SQL profilerUse SQL query AnalyzerUse SQL profilerOptimize T-SQL statementSummaryIn this chapter, we will continue with the description of the pre-stored procedures in Chapter 21st. This chapter describes how to use SQL query analyzer and SQL profile to analyze pre-stored programs and other statements. From the analysis, you can determine whether the T-SQL declarative is effic
Cocoa Packet AnalyzerCocoa Packet Analyzer is a native Mac OS ximplementation of a network protocol Analyzer and Packet sniffer. CPA supportsthe industry-standard PCAP packet capture format for reading, capturing andwriting packet trace files.For the iphone grab Bag tool, you can catch TCP and UDP packets.1. Click http://www.tastycocoabytes.com/cpa/ to download
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.