Advertisement
elacheche

tcpdump

Sep 25th, 2013
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.53 KB | None | 0 0
  1. #tcpdump -nnvvS port 800
  2.  
  3.  
  4. tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
  5. 09:39:17.360870 IP (tos 0x0, ttl 64, id 30504, offset 0, flags [DF], proto TCP (6), length 60)
  6. 192.168.0.50.42047 > 192.168.0.95.800: Flags [S], cksum 0x845e (correct), seq 3859384044, win 14600, options [mss 1460,sackOK,TS val 43905476 ecr 0,nop,wscale 7], length 0
  7. 09:39:17.360916 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  8. 192.168.0.95.800 > 192.168.0.50.42047: Flags [R.], cksum 0x1998 (correct), seq 0, ack 3859384045, win 0, length 0
  9. 09:39:17.360944 IP (tos 0x0, ttl 64, id 34853, offset 0, flags [DF], proto TCP (6), length 60)
  10. 192.168.0.50.42048 > 192.168.0.95.800: Flags [S], cksum 0x1e74 (correct), seq 1493072353, win 14600, options [mss 1460,sackOK,TS val 43905476 ecr 0,nop,wscale 7], length 0
  11. 09:39:17.360949 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  12. 192.168.0.95.800 > 192.168.0.50.42048: Flags [R.], cksum 0xb3ad (correct), seq 0, ack 1493072354, win 0, length 0
  13. 09:39:17.397058 IP (tos 0x0, ttl 64, id 14650, offset 0, flags [DF], proto TCP (6), length 60)
  14. 192.168.0.50.42051 > 192.168.0.95.800: Flags [S], cksum 0x142a (correct), seq 338086135, win 14600, options [mss 1460,sackOK,TS val 43905485 ecr 0,nop,wscale 7], length 0
  15. 09:39:17.397086 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
  16. 192.168.0.95.800 > 192.168.0.50.42051: Flags [R.], cksum 0xa96c (correct), seq 0, ack 338086136, win 0, length 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement