xxxx18一60岁hd中国/日韩女同互慰一区二区/西西人体扒开双腿无遮挡/日韩欧美黄色一级片 - 色护士精品影院www

資源簡介

通過Wireshark捕捉實時網絡數據包,并根據網絡協議分析流程對數據包在TCP/IP各層協議中進行實際解包分析,為網絡協議分析和還原提供技術手段。用Java在Eclipse平臺開發了一個TCP/IP協議數據包分析工具,只支持ARP、IPV4、ICMP、UDP,以及DHCP。

資源截圖

代碼片段和文件信息

package?com.qiusongde.packet;

import?com.qiusongde.pcapparser.ByteArray;

public?class?ARP?extends?Ethernet?{

private?ARPHeader?header?=?new?ARPHeader();
private?byte[]?data;

protected?int?setHeader(byte[]?input){//設置頭部
int?prelength;
int?length;

prelength?=?super.setHeader(input);//父類(底層協議先設置頭部)
header.setHardType(input?prelength);
header.setProtocolType(input?prelength?+?2);
header.setHardLength(input?prelength?+?4);
header.setProtocolLength(input?prelength?+?5);
header.setOperation(input?prelength?+?6);
header.setSenderHardAddr(input?prelength?+?8);
header.setSenderProtoAddr(input?prelength?+?8?+?header.getHardLength());
header.setReceiverHardAddr(input?prelength?+?8?+?header.getHardLength()?+?header.getProtocolLength());
header.setReceiveProtoAddr(input?prelength?+?8?+?2?*?header.getHardLength()?+?header.getProtocolLength());
length?=?8?+?2?*?(header.getHardLength()?+?header.getProtocolLength());

return?prelength?+?length;
}

private?void?setData(byte[]?input?int?offset){
int?length?=?input.length?-?offset;//offset和length相等時沒有data
if(length??!=?0){
data?=?new?byte[length];
for(int?i=0;i data[i]?=?input[offset+i];?
}
else
data?=?null;//沒有數據

}

@Override
public?void?setPacket(byte[]?packet)?{
int?headerlength?=?setHeader(packet);//先設置頭部返回頭部長度
setData(packet?headerlength);
}

protected?String?toHeaderString(){
String?result?=?““;
result?+=?super.toHeaderString();
result?+=?header.toString();

return?result;
}

private?String?toDataString(){
String?result?=?““;

if(data?!=?null){
result?=?“--------數據或填充:\n“;
result?+=?ByteArray.byteArrayToHexStr(data)?+?“\n“;
}

return?result;
}

@Override
public?String?toPacketString()?{
String?result?=?““;
result?+=?toHeaderString();
result?+=?toDataString();

return?result;
}

private?class?ARPHeader{

private?byte[]?hardtype?=?new?byte[2];//硬件類型
private?byte[]?protocoltype?=?new?byte[2];//協議類型
private?byte?hardlength;//硬件長度
private?byte?protocollength;//協議長度
private?byte[]?operation?=?new?byte[2];//操作1請求2回答
private?byte[]?senderhardaddr;//發送方硬件地址
private?byte[]?senderprotoaddr;//發送方協議地址
private?byte[]?receiverhardaddr;//接收方硬件地址
private?byte[]?receiverprotoaddr;//接收方協議地址

public?void?setHardType(byte[]?input?int?offset){
for(int?i=0;i<2;i++){
hardtype[i]?=?input[i+offset];
}
}

public?void?setProtocolType(byte[]?input?int?offset){
for(int?i=0;i<2;i++){
protocoltype[i]?=?input[i+offset];
}
}

public?void?setHardLength(byte[]?input?int?offset){
hardlength?=?input[offset];
}

public?byte?getHardLength(){
return?hardlength;
}


public?void?setProtocolLength(byte[]?input?int?offset){
protocollength?=?input[offset];
}

public?byte?getProtocolLength(){
return?protocollength;
}

public?void?setOperation(byte[]?input?int?offset){
for(int?i=0;i<2;i++){
operation[i

?屬性????????????大小?????日期????時間???名稱
-----------?---------??----------?-----??----
?????文件????????1261??2016-08-13?19:33??reademe.txt
?????文件?????2048757??2016-08-13?19:35??實驗報告-終版.doc
?????目錄???????????0??2016-08-10?10:20??實驗數據\
?????文件?????????778??2016-06-14?13:38??實驗數據\arp.pcap
?????文件????????3252??2016-06-08?20:15??實驗數據\DHCP.pcap
?????文件????????3352??2016-06-12?12:09??實驗數據\Diagram1.dia
?????文件???????49344??2016-06-12?12:09??實驗數據\Diagram1.png
?????文件?????????708??2016-06-14?13:40??實驗數據\icmp.pcap
?????文件??????????74??2016-06-07?22:02??實驗數據\IPv4.pcap
?????文件??????153808??2016-06-12?00:31??實驗數據\PCAP數據結構1.jpeg
?????文件??????199717??2016-06-12?00:33??實驗數據\PCAP數據結構2.jpeg
?????文件??????????82??2016-06-08?21:03??實驗數據\udp.pcap
?????文件???????43313??2016-06-14?13:29??實驗數據\手機.jpg
?????目錄???????????0??2016-06-12?12:28??源代碼\
?????目錄???????????0??2016-08-10?10:20??源代碼\PcapAnaylyzer\
?????文件?????????295??2016-06-09?14:37??源代碼\PcapAnaylyzer\.classpath
?????文件?????????372??2016-06-06?16:14??源代碼\PcapAnaylyzer\.project
?????目錄???????????0??2016-08-10?10:21??源代碼\PcapAnaylyzer\.settings\
?????文件?????????587??2016-06-06?16:14??源代碼\PcapAnaylyzer\.settings\org.eclipse.jdt.core.prefs
?????目錄???????????0??2016-08-10?10:20??源代碼\PcapAnaylyzer\bin\
?????文件???????????6??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\.gitignore
?????目錄???????????0??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\
?????目錄???????????0??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\
?????目錄???????????0??2016-08-10?10:21??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\
?????文件????????4030??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\ARP$ARPHeader.class
?????文件????????2570??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\ARP.class
?????文件????????4005??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\DHCP.class
?????文件????????2116??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\Ethernet$EthernetHeader.class
?????文件????????1137??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\Ethernet.class
?????文件????????3475??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\ICMP$ICMPHeader.class
?????文件????????2211??2016-06-23?18:05??源代碼\PcapAnaylyzer\bin\com\qiusongde\packet\ICMP.class
............此處省略43個文件信息

評論

共有 條評論