Wireshark

前言

正文

Remote Virtual Interface Tool

  • rvictl -l
devzkndeMacBook-Pro:~ devzkn$ rvictl -l

Could not get list of devices

  • rvictl -s UDID
devzkndeMacBook-Pro:~ devzkn$  rvictl -s  fa6770acd2e

Starting device fa6770acd2e0625c36a6f2a6c6 [SUCCEEDED] with interface rvi0
<!-- -x, -X		Stop a device or set of devices -->

wireshark基本用法及过虑规则

  • !mdns
<!-- mDNS即组播DNS(multicast DNS)。使用5353端口,在内网没有DNS服务器时,就会出现此组播信息。 -->

less than 小于 < lt 

小于等于 le

等于 eq

大于 gt

大于等于 ge

不等 ne

<!-- !mdns && http && ip.dst_host eq 11.190.181.63  -->
<!-- !mdns && http.request.full_uri contains  "http://...com" -->


  • 过滤端口
tcp.port eq 443

  • 过滤IP
!mdns || ip.src_host eq 58.216.8.110 

分析L2TP 的 类型VPN 的连接和断开过程

  • 虚拟专用网(Virtual Private Network,VPN)的连接和断开分析
<!-- 1、连接的过程 -->
801	59.648579	192.168.2.61	114.114.114.114	DNS	81	Standard query 0xd39d A origin.guzzoni-apple.com.akadns.net
802	59.649083	192.168.2.61	114.114.114.114	DNS	59	Standard query 0x1828 A www.apple.com
803	59.649547	114.114.114.114	192.168.2.61	DNS	121	Standard query response 0xd39d A origin.guzzoni-apple.com.akadns.net CNAME sg01p01sa.guzzoni-apple.com.akadns.net A 17.252.172.5
804	59.650102	114.114.114.114	192.168.2.61	DNS	204	Standard query response 0x1828 A www.apple.com CNAME www.apple.com.edgekey.net CNAME www.apple.com.edgekey.net.globalredir.akadns.net CNAME e6858.e19.s.tl88.net A 27.148.139.136
<!-- 807	59.651656	192.168.2.61	114.114.114.114	DNS	55	Standard query 0xc06e A knip.com  就是VPN服务器-->
<!-- 808	59.652224	114.114.114.114	192.168.2.61	DNS	349	Standard query response 0xc06e A knip.com CNAME t-qc77a.knip.com A 61.160.210.234 A 61.160.210.241 A 58.216.8.107 A 61.160.210.254 A 61.160.210.235 A 58.216.8.118 A 61.160.210.214 A 61.160.233.223 A 61.160.210.244 A 58.216.8.117 A 61.160.233.239 A 61.160.233.222 A 61.160.210.223 A 61.160.210.229 A 61.160.210.221 A 61.160.210.222 A 61.160.233.240 -->
811	59.653845	192.168.2.61	61.160.210.221	ISAKMP	528	Identity Protection (Main Mode)
831	61.669742	192.168.2.61	61.160.210.221	ISAKMP	348	Quick Mode
834	61.672065	192.168.2.61	61.160.210.221	ESP	160	ESP (SPI=0x0ec12f58)

<!-- 2、断开VPN的过程 -->
29	2.030142	192.168.2.61	114.114.114.114	DNS	51	Standard query 0x553f SOA local
37	2.035028	114.114.114.114	192.168.2.61	DNS	126	Standard query response 0x553f No such name SOA local SOA a.root-servers.net
39	2.036104	192.168.2.61	114.114.114.114	DNS	63	Standard query 0x24ea A guzzoni.apple.com
40	2.036631	192.168.2.61	114.114.114.114	DNS	59	Standard query 0x04de A www.apple.com
41	2.037140	192.168.2.61	114.114.114.114	DNS	55	Standard query 0x2267 A apple.com
42	2.037740	114.114.114.114	192.168.2.61	DNS	152	Standard query response 0x24ea A guzzoni.apple.com CNAME origin.guzzoni-apple.com.akadns.net CNAME sg01p01sa.guzzoni-apple.com.akadns.net A 17.252.172.5
43	2.038264	114.114.114.114	192.168.2.61	DNS	204	Standard query response 0x04de A www.apple.com CNAME www.apple.com.edgekey.net CNAME www.apple.com.edgekey.net.globalredir.akadns.net CNAME e6858.e19.s.tl88.net A 27.148.139.136
44	2.038788	114.114.114.114	192.168.2.61	DNS	103	Standard query response 0x2267 A apple.com A 17.142.160.59 A 17.172.224.47 A 17.178.96.59
46	2.040273	192.168.2.61	61.160.210.221	ISAKMP	108	Informational

52	2.044263	192.168.2.61	114.114.114.114	DNS	71	Standard query 0x0680 A 35-courier.push.apple.com
53	2.044977	114.114.114.114	192.168.2.61	DNS	288	Standard query response 0x0680 A 35-courier.push.apple.com CNAME 35.courier-push-apple.com.akadns.net CNAME china-courier.push-apple.com.akadns.net A 17.252.156.218 A 17.252.156.53 A 17.252.156.51 A 17.252.156.37 A 17.252.157.22 A 17.252.156.63 A 17.252.157.30 A 17.252.156.221




79	2.062457	192.168.2.61	61.160.210.221	L2TP	70	Control Message - CDN (tunnel id=12764, session id=1)

  • 协议知识补充
<!-- ISAKMP:Internet Security Association and Key Management Protocol, -->

Internet 安全关联和密钥管理协议. 一种协议框架,定义了有效负载的格式、实现密钥交换协议的机制以及SA协商。 使用TCP和UDP的端口500,一般使用UDP。

<!-- ESP,封装安全载荷协议(Encapsulating SecurityPayloads), -->
是一种Ipsec协议,用于对IP协议在传输过程中进行数据完整性度量、来源认证、加密以及防回放攻击。

<!-- IP in IP, 又被称为 ipencap,是将IP协议封装入传输用的IP协议的一个例子, -->

<!-- IP隧道是指一种可在两网络间用网际协议进行通信的通道。在该通道里,会先封装其他网络协议的数据包,之后再传输信息。 -->
若IP隧道与两个或多个IPSec一起使用时,可以创建虚拟专用网(Virtual Private Network,VPN)


<!-- SSL(Secure Sockets Layer,安全套接层),及其继任者TLS(Transport Layer Security,传输层安全) -->
 是为网络通信提供安全及数据完整性的一种安全协议。TLS与SSL在传输层对网络连接进行加密。
  • VPN
1、Cisco IPSec,此协议通过密码、RSA SecurID 或 CRYPTOCard 进行用户认证,并通过共享密钥和证书进行机器认证。对于在设备配置期间指定的域,Cisco IPSec 支持“请求 VPN 域”。

2、L2TP/IPSec,此协议通过 MS-CHAPV2 密码、RSA SecurID 或 CRYPTOCard 进行用户认证,并通过共享密钥进行机器认证。

3、PPTP,此协议通过 MS-CHAPV2 密码和 RSA SecurID 或 CRYPTOCard 进行用户认证。

see also

转载请注明: > Wireshark

在操作过程或者文章有问题的话欢迎在 原文 里提问或指正。

赞赏支持

取消

感谢您的支持,我会继续努力的!

扫码支持
扫码支持
扫码打赏,你说多少就多少
最近的文章

ImplementingaVoIPApp

前言写本文的初心是实现开机自启动app的功能,即Apple官方说的:An app with this key is also relaunched in the background immediately after system boot to ensure that the VoIP services are always available.正文 StrategiesforImplementingYourApp Legacy VoIP background ...…

iOSre继续阅读
更早的文章

iOSDevelopersRunErrorFrequentlyAskedQuestions

前言 target specifies product type ‘com.apple.product-type.tool’, but there’s no such product type for the ‘iphoneos’ <!-- http://iosre.com/t/com-apple-product-type-tool/7060/4 --><!-- sudo ./configure-xcode-for-ios-development -->...…

iOSre继续阅读
更多