Ask Your Question

Invalid tcp handshake behaviour

asked 2020-02-15 09:03:24 +0000

updated 2020-02-15 12:41:22 +0000

grahamb gravatar image

Hello, I need some help. I'm using for sending a tcp raw packet inside a LAN with some payload data. In order to be able to send the packet I need to perform a tcp handshake before sending the payload. I verified that no firewall is active in both endpoints. Also, use netstat -a / nmap scan to verify that the used ports are in "listening" state. Details for the endpoints:

source ip  -
source port - 2869
destination ip -
destination port - 5357

When sending a syn from, it can be seen that responds with SYN-ACK. However, as I understand from the documentation, RST the connection and right afterwards send an ACK.

The behavior always occurs and I don't know it the tcp handshake is valid. I need your help.

wireshark export file:

image: Thank you

edit retag flag offensive close merge delete

1 Answer

Sort by ยป oldest newest most voted

answered 2020-02-15 12:42:04 +0000

grahamb gravatar image

updated 2020-02-15 12:42:28 +0000

This isn't really a Wireshark issue, more one for the support systems for Wireshark is showing you what's happening, but the actual problem lies in your use of

edit flag offensive delete link more

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account.

Add Answer

Question Tools

1 follower


Asked: 2020-02-15 09:03:24 +0000

Seen: 234 times

Last updated: Feb 15 '20