This is a static archive of our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Wireshark stubborn TCP connection

0

Hi Everyone! I am firwer123 and i just joined Wireshark Q&A!

Firstly, I hope some one could help me one this,

--Source--------Destination---Protocol----------------Length & Information--------------

192.XXX.1.XX----70.39.98.126-------TCP------54 54589 > dhanalakshmi [ACK] Seq=1 Ack=1 Win=17520 Len=0
70.39.98.126----192.XXX.1.XX-------TCP------67 dhanalakshmi > 54589 [PSH, ACK] Seq=1 Ack=74 Win=65462 Len=13
and a few more similar ones..

192.XXX.1.XX is my local machine

70.39.98.126 is that remote server

Above, is a TCP connection that I've filtered out of my network traffic and besides that this network activity log came from a program that would contact its server(70.39.98.126) whenever i open it..

But now, I wished to stop this program from contacting their server again.. Is there anyway i can stop it using Wireshark...or lets don't say stop it, is there anyway to exploit it?

Additional Information about that remote server (70.39.98.126)

  • Server IP: 70.39.98.126
  • Protocol: TCP
  • Source Port: Dhanalakshmi (34567)
  • Destination Port: 50949

Peoples please help me! I need your help!!

Your Sincerely, firwer123

asked 25 Mar '13, 04:28

firwer123's gravatar image

firwer123
1111
accept rate: 0%

edited 25 Mar '13, 05:04

grahamb's gravatar image

grahamb ♦
19.8k330206


One Answer:

0

Wireshark is not a firewall, so no there's no way it can stop it for you. Wireshark is a (rather passive) network sniffer, so cannot 'exploit' (whatever that means) this or any other TCP connection.

answered 25 Mar '13, 04:52

Jaap's gravatar image

Jaap ♦
11.7k16101
accept rate: 14%