Commit 25c1773
Changed files (3)
corpus/ip.csv
@@ -39,4 +39,11 @@ what is the broadcast address for this network: 172.16.35.14/12,172.31.255.255
[T/F] if ip[6] & 0x02 = 0 and ip[6:2] & 0x1fff = 0 then this is the first fragment,F,ip_fragmentation
[T/F] if ip[6] & 0x02 = 0 and ip[6:2] & 0x1fff = 0 then this is the last fragment,F,ip_fragmentation
+# special addresses
+what is the IPv4 address for the broadcast special address,255.255.255.255,ipv4
+what is the IPv4 address for the unspecified special address,0.0.0.0,ipv4
+what is the IPv4 address range (network/mask) for loopback special addresses,127.0.0.0/8,ipv4
+what is the IPv4 standardized subnet mask for this private network: 192.168.0.0/[?],16,ipv4
+what is the IPv4 standardized subnet mask for this private network: 172.16.0.0/[?],12,ipv4
+what is the IPv4 standardized subnet mask for this private network: 10.0.0.0/[?],8,ipv4
corpus/networking.csv
@@ -2,3 +2,6 @@
what is the length of an ethernet header: ? bytes,14,networking
what is the lenght of an IPv4 header without options: ? bytes,20,networking
what is the lenght of an TCP header without options: ? bytes,20,networking
+what is the length of an IPv4 address: ? bytes,4,networking
+what is the length of an IPv6 address: ? bytes,16,networking
+what is the lenght of a MAC address: ? bytes,6,networking
corpus/packet_capture.csv
@@ -17,10 +17,15 @@ which interface name is a shortcut for all interfaces: tcpdump -i [?],any,packet
# filters: dst
# filters: src
# filters: net
+# filters: ip dst
+# filters: ip src
+# filters: ip host
+# filters: ip net
# filters: portrange
# filters: port
# number of bytes,-s 100,
# all data in packet: -s [?], 0
+# ip network filter with offset and mask
# wireshark
[T/F] Wireshark can sniff packets on the loopback interface on Windows?,F,packet_capture