
HTTP found at Layer 7 of OSI model (Application). Definitions (for personal understanding). Found out that “200 OK” means that everything went well and I was able to connect to the server. I’m noticing the info HTTP/1.1 200 comes up a lot. Of the 779 Response Packets: 3 Client Errors, 115 Redirection, 661 Success. (Verizon Business/ ISP: Edgecast Networks)Ĭ.) I did the same for the source (incoming). UDP: User Datagram Protocol (explained elsewhere in blog)ī.) Then I filtered and organized the destinations (outbound). TCP: Transmission Control Protocol (explained elsewhere in blog). SSLv2: “is an obsolete version of SSL that has been deprecated since 2011 due to having security flaws.”. SSDP: “( SSDP) is a network protocol based on the Internet protocol suite for advertisement and discovery of network services and presence information.”. OCSP: “Online Certificate Status Protocol ( OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate”.
NTP: ” is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NBNS: “stands for NetBIO Name Service, which is a protocol for name resolution.”. MDNS: “multicast DNS protocol resolves hostnames to IP addresses within small networks that do not include a local name server.”. IGMPv3: “Internet Group Management Protocol (IGMP) is the protocol used by IPv4 devices to report their IP multicast group memberships to neighboring multicast devices. ICMP: “(Internet Control Message Protocol) is an error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.”. H1: “is a bi-directional communications protocol used for communications among field devices and to the control system”. EAPOL: “Extensible Authentication Protocol (EAP) over LAN (EAPoL) is a network port authentication protocol “. DNS: Domain Name System “the phonebook of the Internet DNS translates domain names to IP addresses so browsers can load Internet resources.”. DB-lSP-DISC: Dropbox LAN Sync Discovery. ARP: address resolution protocol “is a procedure for mapping a dynamic Internet Protocol address (IP address) to a permanent physical machine address in a local area network (LAN)”. Please let me know the exact display filters to use to detect WPS pin attempts in some kind of a flood attack.A.) With Excel, I grouped all the protocols then got all the unique values. The same also occurred a couple of days back when I was trying WPS attempts against my own device and couldnt see the same frames with the "WPS" display filter in WiresharkI I dropped the issue since I had - in theory - disabled WPS on my AP's so considered it a smaller problem. I tried using the "WPS" display filter in Wireshark as well as the "" filter, no packets were found AS the packets were being recorded! #Wireshark filter by protocol eap mac#
I need to track down the WPS packets and pin-point the MAC address the attempts were issued from. Note, it's a Tenda AC10 router.Īdditionally all my 5Ghz devices got disconnected, I'm not sure if it's because of aggressive WPS packets or a simultaneous deauth flood was issued.
My neighbour is actively trying WPS pins on my router - I know because the "WiFi/WPS" LED on my router lit up when I have permanently turned it off! I double checked the setting using the router admin page through ethernet and it confirmed LED's were off (except during WPS negotiation, which overrides the off setting).