🔐Blog of Osanda

Security Researching and Reverse Engineering

Skip to content
  • 🏠 Home
  • 🔒 My Advisories
  • 💊 Cool Posts
    • 💉 SQLi
    • 🕷 Web App Security
    • 🛠 Tools
    • ☢ Exploits
    • 🔬 Reverse Engineering
    • 🧬 Malware Analysis
  • ☠ Shellcodes
  • ☣ About

PoC

  • Osanda Malith Jayathissa
  • May 18, 2014
  • 2 Comments

Wireshark DoS PoC

I recently found out that Wireshark 1.10.7 32-bit and 64-bit versions crashes when we input a large buffer into the

  • Filter text box
  • Statistics -> IP DESTINATIONS
  • Statistics -> IP Addresses

(more…)

Share this:

  • Tweet
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Share on Tumblr
  • Pocket
Exploits, Uncategorized
0day, DoS, PoC, Wireshark

Search

Archives

Categories

Join 4,752 other subscribers
Buy Me A Coffee

TRANSLATE

Tweets by OsandaMalith

Tags

0day AHK ARM arrays assembly AutoHotKey borland C C c/c++ Certs crackme CSRF ctf DLL Hijacking DoS EE EE 4GEE EE 4GEE Mini eLearnSecurity exploit exploit development format string game hacking HEVD kernel LFI mimikatz MS-DOS MySQL PE Pentesting PHP POST XSS Programming Reverse Engineering reversing shellcode SQLi SQL injection tools Web Application Security windows WMI XSS ZTE
  • Home
  • ☠ Shellcodes
  • ☣ About
  • 💊 Cool Posts
  • 🔒 My Advisories

Copyright © 2025 Osanda Malith Jayathissa