Frame 1502: 249 bytes on wire (1992 bits), 249 bytes captured (1992 bits) Encapsulation type: Ethernet (1) Arrival Time: Jul 22, 2017 02:44:49.623124000 UTC UTC Arrival Time: Jul 22, 2017 02:44:49.623124000 UTC Epoch Arrival Time: 1500691489.623124000 [Time shift for this packet: 0.000000000 seconds] [Time delta from previous captured frame: 0.000707000 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 75.097775000 seconds] Frame Number: 1502 Frame Length: 249 bytes (1992 bits) Capture Length: 249 bytes (1992 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:tls] Ethernet II, Src: Cisco_01:e9:5c (00:09:e8:01:e9:5c), Dst: SamsungElect_75:be:14 (08:ec:a9:75:be:14) Destination: SamsungElect_75:be:14 (08:ec:a9:75:be:14) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) Source: Cisco_01:e9:5c (00:09:e8:01:e9:5c) .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default) .... ...0 .... .... .... .... = IG bit: Individual address (unicast) Type: IPv4 (0x0800) [Stream index: 4] Internet Protocol Version 4, Src: 23.221.96.207, Dst: 172.16.45.172 0100 .... = Version: 4 .... 0101 = Header Length: 20 bytes (5) Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT) 0000 00.. = Differentiated Services Codepoint: Default (0) .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0) Total Length: 235 Identification: 0x5b68 (23400) 010. .... = Flags: 0x2, Don't fragment 0... .... = Reserved bit: Not set .1.. .... = Don't fragment: Set ..0. .... = More fragments: Not set ...0 0000 0000 0000 = Fragment Offset: 0 Time to Live: 60 Protocol: TCP (6) Header Checksum: 0x1fa8 [validation disabled] [Header checksum status: Unverified] Source Address: 23.221.96.207 Destination Address: 172.16.45.172 [Source GeoIP: El Segundo, US, ASN 16625, AKAMAI-AS] [Source GeoIP City: El Segundo] [Source or Destination GeoIP City: El Segundo] [Source GeoIP Country: United States] [Source or Destination GeoIP Country: United States] [Source GeoIP ISO Two Letter Country Code: US] [Source or Destination GeoIP ISO Two Letter Country Code: US] [Source GeoIP AS Number: 16625] [Source or Destination GeoIP AS Number: 16625] [Source GeoIP AS Organization: AKAMAI-AS] [Source or Destination GeoIP AS Organization: AKAMAI-AS] [Source GeoIP Latitude: 33.9214] [Source or Destination GeoIP Latitude: 33.9214] [Source GeoIP Longitude: -118.413] [Source or Destination GeoIP Longitude: -118.413] [Stream index: 12] Transmission Control Protocol, Src Port: 443, Dst Port: 35221, Seq: 1, Ack: 518, Len: 183 Source Port: 443 Destination Port: 35221 [Stream index: 33] [Stream Packet Number: 6] [Conversation completeness: Incomplete, DATA (15)] ..0. .... = RST: Absent ...0 .... = FIN: Absent .... 1... = Data: Present .... .1.. = ACK: Present .... ..1. = SYN-ACK: Present .... ...1 = SYN: Present [Completeness Flags: ··DASS] [TCP Segment Len: 183] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1618495333 [Next Sequence Number: 184 (relative sequence number)] Acknowledgment Number: 518 (relative ack number) Acknowledgment number (raw): 54448356 1000 .... = Header Length: 32 bytes (8) Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Accurate ECN: Not set .... 0... .... = Congestion Window Reduced: Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .... 1... = Push: Set .... .... .0.. = Reset: Not set .... .... ..0. = Syn: Not set .... .... ...0 = Fin: Not set [TCP Flags: ·······AP···] Window: 939 [Calculated window size: 30048] [Window size scaling factor: 32] Checksum: 0x7d1c [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps TCP Option - No-Operation (NOP) Kind: No-Operation (1) TCP Option - No-Operation (NOP) Kind: No-Operation (1) TCP Option - Timestamps: TSval 2358385667, TSecr 114208 Kind: Time Stamp Option (8) Length: 10 Timestamp value: 2358385667 Timestamp echo reply: 114208 [Timestamps] [Time since first frame in this TCP stream: 0.146362000 seconds] [Time since previous frame in this TCP stream: 0.000707000 seconds] [SEQ/ACK analysis] [iRTT: 0.077762000 seconds] [Bytes in flight: 183] [Bytes sent since last PSH flag: 183] TCP payload (183 bytes) Transport Layer Security TLSv1.2 Record Layer: Handshake Protocol: Server Hello Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 103 Handshake Protocol: Server Hello Handshake Type: Server Hello (2) Length: 99 Version: TLS 1.2 (0x0303) Random: b4a794a6065eaf0914695d0a1ba82a9f73715989bbe2abebb3d47ae0e20dbb69 GMT Unix Time: Jan 16, 2066 15:30:46.000000000 UTC Random Bytes: 065eaf0914695d0a1ba82a9f73715989bbe2abebb3d47ae0e20dbb69 Session ID Length: 32 Session ID: fd5d0ab0cf3c99773838200e97ea5bd55dac1cf5f73ca1a0ff4d23e977b74006 Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) Compression Method: null (0) Extensions Length: 27 Extension: renegotiation_info (len=1) Type: renegotiation_info (65281) Length: 1 Renegotiation Info extension Renegotiation info extension length: 0 Extension: next_protocol_negotiation (len=18) Type: next_protocol_negotiation (13172) Length: 18 Next Protocol Negotiation Protocol string length: 8 Next Protocol: http/1.1 Protocol string length: 8 Next Protocol: http/1.0 [JA3S Fullstring: 771,49172,65281-13172] [JA3S: eeb544d2926258e376d8da5dc1ab116e] TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec Content Type: Change Cipher Spec (20) Version: TLS 1.2 (0x0303) Length: 1 Change Cipher Spec Message [Expert Info (Note/Sequence): This session reuses previously negotiated keys (Session resumption)] [This session reuses previously negotiated keys (Session resumption)] [Severity level: Note] [Group: Sequence] TLSv1.2 Record Layer: Handshake Protocol: Encrypted Handshake Message Content Type: Handshake (22) Version: TLS 1.2 (0x0303) Length: 64 Handshake Protocol: Encrypted Handshake Message