ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 5650] New: add custom Destination IP and Source IP in the

Date: Thu, 3 Feb 2011 06:09:08 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5650

           Summary: add custom Destination IP and Source IP in the pcap
           Product: Wireshark
           Version: 1.4.2
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Minor
          Priority: Low
         Component: Extras
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: shurik@xxxxxxxxxxx


Build Information:
Shark 0.99.6

Copyright 1998-2007 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Compiled with GLib 2.14.1, with libpcap 0.9.7, with libz 1.2.3, with libpcre
7.2, with Net-SNMP 5.4.1, with ADNS, without Lua, without GnuTLS, without
Gcrypt, with MIT Kerberos.

Running on Linux 2.6.22.5-31-bigsmp, with libpcap version 0.9.7.

Built using gcc 4.2.1 (SUSE Linux).
--
with -p param, text2pcap will add destination and source IP into IP header.
Format of IPs is decimal and should be reverse.

z.b. php code:

//Reverse
$nar=preg_split('/\./', "10.0.0.1");
$source_ip = $nar[3].".".$nar[2].".".$nar[1].".".$nar[0];
$nar=preg_split('/\./', "192.168.0.1");
$destination_ip = $nar[3].".".$nar[2].".".$nar[1].".".$nar[0];
$exec("text2pcap -t '%F %T.' -p
".ip2long($source_ip).",".ip2long($destination_ip)." -u 5061,5060
message-hex.txt trace.pcap ");

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.