2023-09-14 06:04:46 +0000 | commented question | Sniffing specific TDS messages (with some broader implications) Of course I'll add the port and protocol filter (tcp port 1433) and will filter out the "good" hosts as soon as I find t |
2023-09-13 11:50:06 +0000 | commented question | Sniffing specific TDS messages (with some broader implications) Maybe something like this seems correct? tcp[((tcp[12:1] & 0xf0) >> 2):1] = 0x03 Adapting an example on htt |
2023-09-13 11:48:59 +0000 | commented question | Sniffing specific TDS messages (with some broader implications) Maybe something like this seems correct? tcp[((tcp[12:1] & 0xf0) >> 2):1] = 0x03 Adapting an example on htt |
2023-09-13 11:46:12 +0000 | commented question | Sniffing specific TDS messages (with some broader implications) The capture you linked contains data similar to mine so it is a valid example. Do you suggest something like tcp.paylo |
2023-09-13 10:39:40 +0000 | asked a question | Sniffing specific TDS messages (with some broader implications) Sniffing specific TDS messages (with some broader implications) Hi, I have to distinguish incoming SQL server connection |