vs-uulm / nemesys

NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)
MIT License
48 stars 12 forks source link

FMS calculation for nemesys and netzob #16

Closed techge closed 3 years ago

techge commented 3 years ago

I would like to calculate the FMS for this pcap for netzob_fms.py and nemesys_fms.py, but can't get them working. I would like to parse the Ethernet part.

Running

python nemesys_fms.py -l -2 -r test2.pcapng

I get the following output

Dissection is incomplete. (Compare self.getFieldValues() and self.protocolbytes):
Dissector result: 044500003fc352400040004011f388c0a80181c0a80181c0a80181c0a80181c0a80101c0a80101c0a80101c0a801019ae300359ae30035002b840ff4000100000100000000000006646961626c6f0673706c6f6e6503636f6d0000010001
Original  packet: 4500003fc35240004011f388c0a80181c0a80101

I thought it is best to have an examplary file, this is why I opened this PR. I think it might be connected to #14 but I wanted to open this issue with a less vague request.

techge commented 3 years ago

To prevent the issue described above, I needed to prevent the addition of the following layers, as mentioned in #13.

So, in a way, it is a duplicate...