🔐Blog of Osanda

Security Researching and Reverse Engineering

Skip to content
  • 🏠 Home
  • 🔒 My Advisories
  • 💊 Cool Posts
    • 💉 SQLi
    • 🕷 Web App Security
    • 🛠 Tools
    • ☢ Exploits
    • 🔬 Reverse Engineering
    • 🧬 Malware Analysis
  • ☠ Shellcodes
  • ☣ About

PoC

  • Osanda Malith Jayathissa
  • May 18, 2014
  • 2 Comments

Wireshark DoS PoC

I recently found out that Wireshark 1.10.7 32-bit and 64-bit versions crashes when we input a large buffer into the

  • Filter text box
  • Statistics -> IP DESTINATIONS
  • Statistics -> IP Addresses

(more…)

Share this:

  • Tweet
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Share on Tumblr
  • Pocket
Exploits, Uncategorized
0day, DoS, PoC, Wireshark

Search

Archives

Categories

Join 4,752 other subscribers
Buy Me A Coffee

TRANSLATE

Tweets by OsandaMalith

Tags

0day ARM assembly blogging C c/c++ Certs crackme CSRF ctf DLL Hijacking DoS egg hunting eLearnSecurity exploit exploit development HEVD kernel LFI Microsoft mimikatz MS-DOS MSN MySQL PE Pentesting PHP POST XSS Programming Reverse Engineering reversing SecurityNet.org security researchers shellcode special thanks SQLi SQL injection technology tools vulnerable version Web Application Security windows WMI XSS ZTE
  • Home
  • ☠ Shellcodes
  • ☣ About
  • 💊 Cool Posts
  • 🔒 My Advisories

Copyright © 2025 Osanda Malith Jayathissa