Sign in to follow this  
Followers 0
canr

wireshark sniffing

1 post in this topic

I have a program which offers users the ability to connect to a large amount of socks server. You start up the program then it will wget a huge list.

184	38.040568	192.168.1.106	**.**.**.***	HTTP	GET /socks/ipuserv2.php?hid&lic= HTTP/1.0 Continuation or non-HTTP traffic
183 38.040174 192.168.1.106 **.**.**.*** TCP hhb-gateway > http [ACK] Seq=1 Ack=1 Win=65535 Len=0

What do I look for or is there a certain filter that I should apply?

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0