我在MAC访问列表中找到了被阻止的MAC地址(00-1A-B6-00-64-00),并且禁用了MAC过滤后,在Wireshark中显示了此详细信息:
Frame 112389: 342 bytes on wire (2736 bits), 342 bytes captured (2736 bits) on interface 0
Ethernet II, Src: TexasIns_00:64:00 (00:1a:b6:00:64:00), Dst: Broadcast (ff:ff:ff:ff:ff:ff)
Internet Protocol Version 4, Src: 0.0.0.0, Dst: 255.255.255.255
User Datagram Protocol, Src Port: 68, Dst Port: 67
Bootstrap Protocol
Message type: Boot Request (1)
Hardware type: Ethernet (0x01)
Hardware address length: 6
Hops: 0
Transaction ID: 0x21c6e068
Seconds elapsed: 30831
Bootp flags: 0x0000 (Unicast)
Client IP address: 0.0.0.0
Your (client) IP address: 0.0.0.0
Next server IP address: 0.0.0.0
Relay agent IP address: 0.0.0.0
Client MAC address: TexasIns_00:64:00 (00:1a:b6:00:64:00)
Client hardware address padding: 00000000000000000000
Server host name: stellaris
Boot file name not given
Bootp vendor specific options: 000000000000000000000000000000000000000000000000...
我搜索后TexasIns_00
发现该设备是USB数据包嗅探器。
你认为这是真的吗?
使用此信息,您只能说出它可能是具有德州仪器(TI)生产的NIC的设备。您是如何得出结论的,这是一个USB设备?
—
塞斯(Seth)
在google =型号中找到的结果:TI CC2540或CC1111,视频为youtube.com/watch?v=PXT3y9-gUCc
—
Just4Net