Skip to content

GN Nettest WinPharoah capture file (.eth)

.eth file signature | application/octet-stream

GN Nettest WinPharoah capture file

Safe

Magic Bytes

Offset 0
1A 35 01 00

Sources: Gary Kessler

Extension

.eth

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .eth files in Python

Python
def is_eth(file_path: str) -> bool:
    """Check if file is a valid ETH by magic bytes."""
    signature = bytes([0x1A, 0x35, 0x01, 0x00])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .eth files in Node.js

Node.js
function isETH(buffer: Buffer): boolean {
  const signature = Buffer.from([0x1A, 0x35, 0x01, 0x00]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .eth files in Go

Go
func IsETH(data []byte) bool {
    signature := []byte{0x1A, 0x35, 0x01, 0x00}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/eth
curl https://filesignature.org/api/v1/eth

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .eth file?

A .eth file is a GN Nettest WinPharoah capture file file. GN Nettest WinPharoah capture file

What are the magic bytes for .eth files?

The magic bytes for GN Nettest WinPharoah capture file files are 1A 35 01 00 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .eth file?

To validate a .eth file, read the first bytes of the file and compare them against the known magic bytes (1A 35 01 00) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .eth files?

There is no officially registered MIME type for .eth files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .eth files?

GN Nettest WinPharoah capture file (.eth) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.