Release date:Updated on: 2012-12-09
Affected Systems:Wireshark 1.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2012-6052
Wireshark (formerly known as Ethereal) is a very popular open-source network traffic analysis software.
Wireshark has a security vulnerability when processing multiple pcap-ng format files, which can cause leakage of Sensitive Host name resolution information.
Link
Pcap, the packet Capture library, grabs the package library and provides a high-level interface to the capture system. All packets on the network, even those sent to other hosts, can be captured through this mechanism. It also supports saving captured packets as local files and reading information from local files. There are a few more details to refer to: http://baike.baidu.com/view/6584893.htm Some introductions of Libpcap, http://baike.baidu.com/v
Demand:1. Read the PCAP message captured by Wireshark2. Filter out specific messages3, analysis of the interval between the specific message is consistent with the lawKey function or variable:Rdpcap ()Filter (): Using a lambda functionP.timeLS () can be used to check the text of the supported fields, because the link layer and the IP layer with the field is repeated, you may use P[IP].SRC to represent the IP source address, type is a string.P.load rep
.
For definitions, see http :\\
3. Block length (16 bit)
The block length includes chunk type, Chunk flags, Chunk length, and Chunk value.
4. Block Value (variable length)
The block value content transmits the actual information in the block. The content is determined by the message block type. The length of the block value is not long.Sctp struct Definition
// Sctp header typedef struct _ sctp_header {_ int16 srcport; _ int16 dstport; _ int32 ivertag; _ int32 ichecksum;} _ sctpheader; // chunk
Pcap file format Analysis
I. Basic Format:File header data packet ......
Ii. File Header structure:Sturct pcap_file_header {DWORD magic; Word version_major; Word version_minor; DWORD thiszone; DWORD sigfigs; DWORD snaplen; DWORD linktype;} Description: 1. identifier: 32-bit, the value of this flag is 0xa1b2c3d4 in hexadecimal notation. A 32-bit magic number, the magic number has the value hex a1b2c3d4.2, Master version number: 16 bits, default value:
Wireshark is a network protocol analysis tool in windows/linux. Wireshark 1.4.1-1.4.4 has a buffer overflow vulnerability when processing pcap files, which may cause arbitrary code execution. Wireshark 1.4.5 fixes this security issue.
[+] Info:~~~~~~~~~Wireshark 1.4.1-1.4.4 SEH Overflow Exploit
[+] Poc:~~~~~~~~~
View sourceprint? 1 #! /Usr/bin/env python
Import "> https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5838
Label: HTTP Io ar OS using Java SP data Div Remember the fiddler and Charles debugger I recommended a long time ago? They are both powerful and powerful tools for debugging HTTP. Good tools help you get twice the result with half the effort. Basically, I am a complete tool control. One day, if you are tired of writing "traditional" PHP and want to play socket, engage in emerging languages or frameworks su
JVM monitoring tools-Introduction to several common tools and jvm monitoring-common toolsIntroduction to JVM monitoring tools
Jdk provides a powerful GUI-based jvm monitoring tool, which can be seen in the jdk bin directory, such as jconsole, jvisualvm, and oracle jrockit jvm's jrmc.exe.Introduction:
GUI tools
Core tips: Flash CS4 in the interface with the previous version of CS3 on the whole is not very different, let us introduce the tool in CS4.
Flash CS4 in the interface with the previous version of CS3 generally does not make a big difference, let us now introduce the tools in the CS4. In the Tools menu
Added the 3d tool Deco tool skeleton tool. Added an animation editor for the MC. The scripting lang
The most comprehensive Java byte operations, conversion and hexadecimal conversion tools for processing basic Java data, common tools for streaming media and underlying java development projects, and javabyte tools
Conversion and hexadecimal conversion tools used to process basic Java data
I. Implementation Functions
1
The command parameter for saving tcpdump packets to a file is-wxxx. cap capture eth1 package tcpdump-ieth1-w/tmp/xxx. cap catch 192.168.1.123 package tcpdump-ieth1host192.168.1.123-w/tmp/xxx. cap catch 192.168.1.123 port 80 package
when detecting unauthorized file system modifications or malicious activities embedded in software and Custom Application log files through configuration. A central management server is responsible for executing policy management tasks between different operating systems. The ossec project is supported by Trend Micro.
Project Link: https://github.com/ossec/ossec-hids
Passivedns
Passivedns can passively collect DNS records to assist in accident handling, network security monitoring, and digital
OSSEC project is supported by Trend Micro Company. Project Link: https://github.com/ossec/ossec-hids11, PassivednsPassivedns is able to collect DNS records passively, thus enabling the functions of incident handling assistance, network security monitoring, and digital forensics. The software can be configured to read PCAP (i.e. packet capture) files and output DNS data as log files or extract data traffic from a specific interface.This tool can act o
Arpspoof is a tool for ARP spoofingArpspoof-i nic-t destination IP default gatewayIf the Kali is not IP-forwarding then the target will be disconnected because of the misconfiguration of the network. This is called ARP break-out attack.1 >/proc/sys/net/ipv4/ip_forward0 >/proc/sys/net/ipv4/ip_forwardTo see if IP forwarding was successful: Cat/proc/sys/net/ipv4/ip_forward if display 1 indicates success, 0 turns on failedWhen IP forwarding is turned on, the traffic passes through the Kali host and
With the continuous development of the Internet industry, a variety of monitoring tools are countless. Here is a list of the most complete monitoring tools on the Web. So you can have more than 80 ways to manage your machine. In this article, we mainly include the following:
Command-line tools
Web-related content
System-related monitoring
With the continuous development of the Internet industry, a variety of monitoring tools are countless. Here is a list of the most complete monitoring tools on the Web. So you can have more than 80 ways to manage your machine. In this article, we mainly include the following:
Command-line tools
Web-related content
System-related monitoring
To learn Python on Linux, the virtual machine is installed today and the Ubuntu system is installed on it. When the installation is complete, you are always prompted to install VMware Tools, and as a result of curiosity, we looked online for information about the role of VMware Tools and how to install it. Now you can summarize the knowledge of VMware tools and m
Flash CS4 in the interface with the previous version of CS3 generally does not make a big difference, let us now introduce the tools in the CS4. In the Tools menu
Added the 3d tool Deco tool skeleton tool. Added an animation editor for the MC. The scripting language has not changed. A comparative trial of the 3d features in the new version as well as the skeleton
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.