ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 6616] I would like to contribute dissector for ELCOM proto

Date: Sat, 26 Nov 2011 05:51:21 -0800 (PST)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6616

--- Comment #2 from Juha Takala <user1@xxxxxxxxxxxx> 2011-11-26 05:51:19 PST ---
Created an attachment (id=7473)
 --> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=7473)
Sample capture file containing ELCOM traffic

This file contains data that has been collected by 'tshark ... port 5997'.
5997 is the 'well known' ELCOM port in the environment in my case.

I have substituted all original IP-addresses in this file with something like:
 x.x.x.x -> 10.1.1.1
 y.y.y.y -> 10.2.2.2
 z.z.z.z -> 10.3.3.3

This substitution is done with a perl script, using 'tshark -x' and
'text2pcap'.

 -juha

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.