Title: RE: [Ethereal-users] winsock tcp packet format
decode as;
0x0e93 - 3731 sport
0xad86 44422 - dport
sequence number 0x8aaec835
ack number 0x68bdde15
header length 0x50 -20 bytes
tcp flags - 0x18 PSH ACK
window 0xfaf0 = 64240 bytes
checksum 0x3c60
data then starts at 00 00
This is a small test message etc...
looks ok to me.
Giles
-----Original Message-----
From: Lewis sn [mailto:myzmlm@xxxxxxxxxxx]
Sent: Monday, July 14, 2003 9:39 PM
To: ethereal-users@xxxxxxxxxxxx
Subject: [Ethereal-users] winsock tcp packet format
Hi all. I'm trying to understand winsock tcp/ip stack. I send one pakcet
from one win2000 station port 1807 to another win2000 station port 44422 a
message:This is a small test message [numer 0]. I can see data link, ip and
tcp header clearly. But there are many strange stuff in the tcp data payload
except my message. Anyone has idea about it? Thanks.
client:
wsprintf(Buffer, "This is a small test message [number 0]");
retval = send(conn_socket, Buffer, sizeof(Buffer), 0);
TCP data:
0e 93 ad 86 8a ae c8 35 68 bd de 15 50 18 fa f0 3c 60 00 00 54 68 69 73 20
69 73 20 61 20 73 6d 61 6c 6c 20 74 65 73 74 20 6d 65 73 73 61 67 65 20 5b
6e 75 6d 62 65 72 20 30 5d 00 00 00 00 00 00 00 00 00 e0 1a 79 00 a8 0c 79
00 78 01 79 00 d8 12 79 00 e0 12 79 00 08 08 00 00 00 00 00 00 58 07 79 00
58 07 79 00 b0 ff 12 00 f4 64 fb 77 48 16 f8 77 ff ff ff ff 68 ff 12 00 8f
2a 40 00 00 00 79 00 09 00 00 00 00 08 00 00 f4 64 fb 77 14 00 00 00
_________________________________________________________________
Help STOP SPAM with the new MSN 8 and get 2 months FREE*
http://join.msn.com/?page=features/junkmail
_______________________________________________
Ethereal-users mailing list
Ethereal-users@xxxxxxxxxxxx
http://www.ethereal.com/mailman/listinfo/ethereal-users