Avatar

Ponziani

Ponziani@sh.itjust.works
Joined
18 posts • 15 comments
Direct message

Im a little knowledgeable with this stuff but i do not know how to see the “handshake” itself, but maybe this is synonymous with what i am doing:

Right click any of the packets (TCP or SSH) > Follow > TCP stream

From there i can see some info about the ssh protocol and connection, as well as the 2 devices communicating (Operating systems used) followed by random gibberish which is the encrypted data.

When I analyze the TCP packet “frames”, they contain data including the motherboard manufacturer, but packets themselves look like its just gibberish.

Thanks by the way for trying to help me :)

permalink
report
parent
reply

It looks like everything is in 1 stream, maybe that answers your question? I am capturing traffic only on port 22 briefly while the rsync is running to look at the packets

permalink
report
parent
reply

The only thing missing is a random arrow

permalink
report
reply

Only way is to run to Lichess

permalink
report
reply