Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- tcpdump di connessione verso google:
- ----
- [k0smik0@cavallo-pazzo ~]$ sudo tcpdump -i wlan0 "port 80"
- [sudo] password for k0smik0:
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on wlan0, link-type EN10MB (Ethernet), capture size 65535 bytes
- 22:31:30.380195 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [S], seq 534482877, win 29200, options [mss 1460,sackOK,TS val 233135107 ecr 0,nop,wscale 7], length 0
- 22:31:30.436565 IP mil01s18-in-f31.1e100.net.http > 192.168.1.33.51254: Flags [S.], seq 1285510079, ack 534482878, win 42540, options [mss 1430,sackOK,TS val 3635979909 ecr 233135107,nop,wscale 6], length 0
- 22:31:30.436613 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [.], ack 1, win 229, options [nop,nop,TS val 233135164 ecr 3635979909], length 0
- 22:31:30.436778 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233135164 ecr 3635979909], length 454
- 22:31:30.694431 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233135422 ecr 3635979909], length 454
- 22:31:30.952410 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233135680 ecr 3635979909], length 454
- 22:31:31.468373 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233136196 ecr 3635979909], length 454
- 22:31:32.500406 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233137228 ecr 3635979909], length 454
- 22:31:34.560394 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233139288 ecr 3635979909], length 454
- 22:31:38.680470 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233143408 ecr 3635979909], length 454
- 22:31:46.920419 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233151648 ecr 3635979909], length 454
- 22:32:03.400378 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233168128 ecr 3635979909], length 454
- 22:32:28.268316 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [F.], seq 455, ack 1, win 229, options [nop,nop,TS val 233192995 ecr 3635979909], length 0
- 22:32:28.347405 IP mil01s18-in-f31.1e100.net.http > 192.168.1.33.51254: Flags [.], ack 1, win 665, options [nop,nop,TS val 3636037805 ecr 233135164,nop,nop,sack 1 {455:456}], length 0
- 22:32:36.424365 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233201152 ecr 3636037805], length 454
- 22:32:36.944363 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233201672 ecr 3636037805], length 454
- 22:32:37.984380 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233202712 ecr 3636037805], length 454
- 22:32:40.064449 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233204792 ecr 3636037805], length 454
- 22:32:44.216424 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233208944 ecr 3636037805], length 454
- 22:32:52.520443 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233217248 ecr 3636037805], length 454
- 22:33:09.128403 IP 192.168.1.33.51254 > mil01s18-in-f31.1e100.net.http: Flags [P.], seq 1:455, ack 1, win 229, options [nop,nop,TS val 233233856 ecr 3636037805], length 454
- 22:33:23.909854 IP 192.168.1.33.46684 > cache.google.com.http: Flags [S], seq 3516824523, win 29200, options [mss 1460,sackOK,TS val 233248637 ecr 0,nop,wscale 7], length 0
- 22:33:23.958732 IP cache.google.com.http > 192.168.1.33.46684: Flags [S.], seq 3894637893, ack 3516824524, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 6], length 0
- 22:33:23.958874 IP 192.168.1.33.46684 > cache.google.com.http: Flags [.], ack 1, win 229, length 0
- 22:33:23.959182 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:24.207447 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:24.456393 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:24.955444 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:25.952441 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:27.948412 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:31.944406 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:39.928399 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:42.544457 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [S], seq 3839230325, win 29200, options [mss 1460,sackOK,TS val 233267272 ecr 0,nop,wscale 7], length 0
- 22:33:42.544609 IP 192.168.1.33.52448 > mil01s17-in-f15.1e100.net.http: Flags [S], seq 1120811622, win 29200, options [mss 1460,sackOK,TS val 233267272 ecr 0,nop,wscale 7], length 0
- 22:33:42.600323 IP mil01s17-in-f15.1e100.net.http > 192.168.1.33.52447: Flags [S.], seq 3923205911, ack 3839230326, win 42540, options [mss 1430,sackOK,TS val 3363591060 ecr 233267272,nop,wscale 6], length 0
- 22:33:42.600373 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], ack 1, win 229, options [nop,nop,TS val 233267328 ecr 3363591060], length 0
- 22:33:42.600685 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233267328 ecr 3363591060], length 1418
- 22:33:42.602729 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [P.], seq 1419:1910, ack 1, win 229, options [nop,nop,TS val 233267330 ecr 3363591060], length 491
- 22:33:42.602746 IP mil01s17-in-f15.1e100.net.http > 192.168.1.33.52448: Flags [S.], seq 1753142346, ack 1120811623, win 42540, options [mss 1430,sackOK,TS val 3363578455 ecr 233267272,nop,wscale 6], length 0
- 22:33:42.602766 IP 192.168.1.33.52448 > mil01s17-in-f15.1e100.net.http: Flags [.], ack 1, win 229, options [nop,nop,TS val 233267330 ecr 3363578455], length 0
- 22:33:42.714379 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [P.], seq 1419:1910, ack 1, win 229, options [nop,nop,TS val 233267442 ecr 3363591060], length 491
- 22:33:42.971391 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233267699 ecr 3363591060], length 1418
- 22:33:43.484405 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233268212 ecr 3363591060], length 1418
- 22:33:44.512403 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233269240 ecr 3363591060], length 1418
- 22:33:46.568409 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233271296 ecr 3363591060], length 1418
- 22:33:50.680368 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233275408 ecr 3363591060], length 1418
- 22:33:52.603022 IP 192.168.1.33.52448 > mil01s17-in-f15.1e100.net.http: Flags [F.], seq 1, ack 1, win 229, options [nop,nop,TS val 233277330 ecr 3363578455], length 0
- 22:33:52.659575 IP mil01s17-in-f15.1e100.net.http > 192.168.1.33.52448: Flags [.], ack 2, win 665, options [nop,nop,TS val 3363588511 ecr 233277330], length 0
- 22:33:52.659648 IP mil01s17-in-f15.1e100.net.http > 192.168.1.33.52448: Flags [F.], seq 1, ack 2, win 665, options [nop,nop,TS val 3363588511 ecr 233277330], length 0
- 22:33:52.659687 IP 192.168.1.33.52448 > mil01s17-in-f15.1e100.net.http: Flags [.], ack 2, win 229, options [nop,nop,TS val 233277387 ecr 3363588511], length 0
- 22:33:55.912415 IP 192.168.1.33.46684 > cache.google.com.http: Flags [P.], seq 1:795, ack 1, win 229, length 794
- 22:33:58.888407 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233283616 ecr 3363591060], length 1418
- 22:34:15.304375 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233300032 ecr 3363591060], length 1418
- 22:34:24.008025 IP cache.google.com.http > 192.168.1.33.46684: Flags [F.], seq 1, ack 1, win 457, length 0
- 22:34:24.008401 IP 192.168.1.33.46684 > cache.google.com.http: Flags [.], ack 2, win 229, length 0
- 22:34:24.008622 IP 192.168.1.33.46684 > cache.google.com.http: Flags [F.], seq 795, ack 2, win 229, length 0
- 22:34:24.057847 IP cache.google.com.http > 192.168.1.33.46684: Flags [R], seq 3894637895, win 0, length 0
- 22:34:48.136448 IP 192.168.1.33.52447 > mil01s17-in-f15.1e100.net.http: Flags [.], seq 1:1419, ack 1, win 229, options [nop,nop,TS val 233332864 ecr 3363591060], length 1418
- 58 packets captured
- 58 packets received by filter
- 0 packets dropped by kernel
- ----
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement