Commit 25c1773

bryfry <bryon.fryer@gmail.com>
2016-12-16 10:21:34
add questions
1 parent 4ab6ce2
corpus/ip.csv
@@ -39,4 +39,11 @@ what is the broadcast address for this network: 172.16.35.14/12,172.31.255.255
 [T/F] if ip[6] & 0x02 = 0 and ip[6:2] & 0x1fff = 0 then this is the first fragment,F,ip_fragmentation 
 [T/F] if ip[6] & 0x02 = 0 and ip[6:2] & 0x1fff = 0 then this is the last fragment,F,ip_fragmentation 
 
+# special addresses
+what is the IPv4 address for the broadcast special address,255.255.255.255,ipv4
+what is the IPv4 address for the unspecified special address,0.0.0.0,ipv4
+what is the IPv4 address range (network/mask) for loopback special addresses,127.0.0.0/8,ipv4
+what is the IPv4 standardized subnet mask for this private network: 192.168.0.0/[?],16,ipv4
+what is the IPv4 standardized subnet mask for this private network: 172.16.0.0/[?],12,ipv4
+what is the IPv4 standardized subnet mask for this private network: 10.0.0.0/[?],8,ipv4
 
corpus/networking.csv
@@ -2,3 +2,6 @@
 what is the length of an ethernet header: ? bytes,14,networking
 what is the lenght of an IPv4 header without options: ? bytes,20,networking
 what is the lenght of an TCP header without options: ? bytes,20,networking
+what is the length of an IPv4 address: ? bytes,4,networking
+what is the length of an IPv6 address: ? bytes,16,networking
+what is the lenght of a MAC address: ? bytes,6,networking
corpus/packet_capture.csv
@@ -17,10 +17,15 @@ which interface name is a shortcut for all interfaces: tcpdump -i [?],any,packet
 # filters: dst
 # filters: src
 # filters: net
+# filters: ip dst
+# filters: ip src
+# filters: ip host
+# filters: ip net
 # filters: portrange
 # filters: port
 # number of bytes,-s 100, 
 # all data in packet: -s [?], 0
+# ip network filter with offset and mask
 
 # wireshark
 [T/F] Wireshark can sniff packets on the loopback interface on Windows?,F,packet_capture