File:Wireshark tether app device decovery.png

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search

Original file(3,072 × 2,106 pixels, file size: 1.21 MB, MIME type: image/png)

Summary

Before establishing an SSH session, the Tether app sends an multicast discovery UDP packet to 255.255.255.255 on port 20002. This message gets send 4 times. After that, the Tether app send another unicast message to responding devices on port 20002. The syntax of the payload is mostly unclear, an change after a restart. Anyway a device will still respond to any payload captured at any time. I assume that this discovery process is used to get device capatibilities and to finally initialize a secure channel via SSH. How the SSH tunnel gets initiated is also unkown at this state of research.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current20:13, 1 July 2020Thumbnail for version as of 20:13, 1 July 20203,072 × 2,106 (1.21 MB)JPDoe (talk | contribs)Before establishing an SSH session, the Tether app sends an multicast discovery UDP packet to <code>255.255.255.255</code> on port <code>20002</code>. This message gets send 4 times. After that, the Tether app send another unicast message to responding...

The following page uses this file:

Metadata