It seems that the pcap file got truncated somehow.
I still have a copy of the pcap file that was
originally distributed for these exercises and the
original file is much larger.
As shown above Bro-2.3 parses the ‘Resp_mime_types’ as ‘-’. But in fact, when I use wireshark to parse this stream, the type is '‘application/x-shockwave-flash’.
In fact I have encountered this problem for quite several times, so I wonder why this happened and how to solve it !
Thanks a lot if anyone can answer my question!
Yours,
Rui-Yuan
What you're seeing there is what the server declared the content to be. Bro ignores that value and sniffs the content to try and identify it.
You have found a weakness in our shockwave detection fingerprint though. I'm going to be doing a commit into master soon that improves on our Flash detection (our signatures don't detect LZMA compressed flash files).