A simple tool to parse various packets.
Protocol | Id |
---|---|
IPv6 | net/ip6 |
UDP | net/udp |
CoAP | coap |
Thread Tlv | thread/tlv |
Thread Network Tlv | thread/netdata/tlv |
jshark -t {id} {hex}
jshark -t net/ip6 \
6000000000e11140fe80000000000000021cdaffff001888fe80000000000000021cdaffff00188a\
0401f0b101066faf48656c6c6f20303036203078464633430a0012131415161718191a1b1c1d1e1f\
202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f4041424344454647\
48494a4b4c4d4e4f5051525354
[IPv6]
header:
version: 6
trafficClass: 0
flowLabel: 0
length: 225
nextHeader: 17
hopLimit: 64
src: 0xfe80000000000000021cdaffff001888
dst: 0xfe80000000000000021cdaffff00188a
headers:
payload: 0x0401f0b101066faf48656c6c6f20303036203078464633430a0012131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f5051525354
[UDP]
sport: 1025
dport: 61617
length: 262
chksum: 28591
payload: 0x48656c6c6f20303036203078464633430a0012131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f5051525354
xyk-macbookpro:jshark xyk$ jshark -t net/ip6 6000000000e11140fe80000000000000021cdaffff001888fe80000000000000021cdaffff00188a0401f0b101066faf48656c6c6f20303036203078464633430a0012131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f5051525354
[IPv6]
header:
version: 6
trafficClass: 0
flowLabel: 0
length: 225
nextHeader: 17
hopLimit: 64
src: 0xfe80000000000000021cdaffff001888
dst: 0xfe80000000000000021cdaffff00188a
headers:
payload: 0x0401f0b101066faf48656c6c6f20303036203078464633430a0012131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f5051525354
[UDP]
sport: 1025
dport: 61617
length: 262
chksum: 28591
payload: 0x48656c6c6f20303036203078464633430a0012131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f5051525354