THC SSL Application Layer 7 Resource Denial of Service DoS Attack PCAP file Download

Download Attachments

  • 1 pcap thcssl
    ssl flood
    Date added: September 23, 2016 12:59 am Added by: admin File size: 255 KB Downloads: 160

2016-05-10 22:55:21.763780 IP 192.168.1.1.80 > 192.168.1.100.46528: Flags [S.], seq 2840197845, ack 3419153931, win 5792, options [mss 1460,sackOK,TS val 19582549 ecr 48899446,nop,wscale 0], length 0
E..<..@.@……….d.P…I….&…..i……….
.*.U..%v….
2016-05-10 22:55:21.763794 IP 192.168.1.100.46528 > 192.168.1.1.80: Flags [.], ack 1, win 229, options [nop,nop,TS val 48899446 ecr 19582549], length 0
E..4.}@.@……d…….P..&..I………….
..%v.*.U
2016-05-10 22:55:21.763846 IP 192.168.1.100.46528 > 192.168.1.1.80: Flags [P.], seq 1:102, ack 1, win 229, options [nop,nop,TS val 48899446 ecr 19582549], length 101: HTTP
E….~@.@..+…d…….P..&..I…….A…..
..%v.*.U….`…\….wb.t.8……..L..0l..d.~+..-“9….5…….-.#….. ……………………………….
2016-05-10 22:55:21.763866 IP 192.168.1.100.46530 > 192.168.1.1.80: Flags [S], seq 2524174511, win 29200, options [mss 1460,sackOK,TS val 48899446 ecr 0,nop,wscale 7], length 0
E..<..@.@..,…d…….P.s……..r…………
..%v……..
2016-05-10 22:55:21.767307 IP 192.168.1.1.80 > 192.168.1.100.46528: Flags [.], ack 102, win 5792, options [nop,nop,TS val 19582549 ecr 48899446], length 0
E..44.@.@……….d.P…I….&p………..
.*.U..%v
2016-05-10 22:55:21.767853 IP 192.168.1.1.80 > 192.168.1.100.46530: Flags [S.], seq 2843979570, ack 2524174512, win 5792, options [mss 1460,sackOK,TS val 19582549 ecr 48899446,nop,wscale 0], length 0
E..<..@.@……….d.P…..2.s……7……….
.*.U..%v….
2016-05-10 22:55:21.767858 IP 192.168.1.100.46530 > 192.168.1.1.80: Flags [.], ack 1, win 229, options [nop,nop,TS val 48899447 ecr 19582549], length 0
E..4..@.@..3…d…….P.s…..3………..
..%w.*.U
2016-05-10 22:55:21.767900 IP 192.168.1.100.46530 > 192.168.1.1.80: Flags [P.], seq 1:102, ack 1, win 229, options [nop,nop,TS val 48899447 ecr 19582549], length 101: HTTP
E…..@.@……d…….P.s…..3…..A…..
..%w.*.U….`…\……..U..m…c…….kQ………….5…….-.#….. ……………………………….
2016-05-10 22:55:21.767914 IP 192.168.1.100.46532 > 192.168.1.1.80: Flags [S], seq 4040777504, win 29200, options [mss 1460,sackOK,TS val 48899447 ecr 0,nop,wscale 7], length 0
E..<zW@.@.<….d…….P.._ ……r…………
..%w……..
2016-05-10 22:55:21.772031 IP 192.168.1.1.80 > 192.168.1.100.46530: Flags [.], ack 102, win 5792, options [nop,nop,TS val 19582549 ecr 48899447], length 0
E..4af@.@.U……..d.P…..3.s……f3…..
.*.U..%w
2016-05-10 22:55:21.772608 IP 192.168.1.1.80 > 192.168.1.100.46532: Flags [S.], seq 2847078466, ack 4040777505, win 5792, options [mss 1460,sackOK,TS val 19582550 ecr 48899447,nop,wscale 0], length 0
E..<..@.@……….d.P…..B.._!……………
.*.V..%w….
2016-05-10 22:55:21.772613 IP 192.168.1.100.46532 > 192.168.1.1.80: Flags [.], ack 1, win 229, options [nop,nop,TS val 48899449 ecr 19582550], length 0
E..4zX@.@.<….d…….P.._!…C………..
..%y.*.V
2016-05-10 22:55:21.772637 IP 192.168.1.100.46532 > 192.168.1.1.80: Flags [P.], seq 1:102, ack 1, win 229, options [nop,nop,TS val 48899449 ecr 19582550], length 101: HTTP
E…zY@.@.<P…d…….P.._!…C…..A…..
..%y.*.V….`…\..Q7..r7+.R….”…>.!. ‘F.%s….C….5…….-.#….. ……………………………….
2016-05-10 22:55:21.772648 IP 192.168.1.100.46534 > 192.168.1.1.80: Flags [S], seq 3662814013, win 29200, options [mss 1460,sackOK,TS val 48899449 ecr 0,nop,wscale 7], length 0
E..<>D@.@.x….d…….P.R.=……r…………

Leave a Reply