Advertisement
LanMan

Untitled

Nov 24th, 2014
399
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.71 KB | None | 0 0
  1. listening on enp9s0, link-type EN10MB (Ethernet), capture size 262144 bytes
  2. 23:00:58.971732 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542172993 ecr 0,sackOK,eol], length 0
  3. 23:00:58.974087 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  4. 23:00:59.210817 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542173232 ecr 0,sackOK,eol], length 0
  5. 23:00:59.215369 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  6. 23:01:00.473616 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542174485 ecr 0,sackOK,eol], length 0
  7. 23:01:00.474148 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542174485 ecr 0,sackOK,eol], length 0
  8. 23:01:00.483188 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  9. 23:01:00.483546 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  10. 23:01:01.583481 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542175584 ecr 0,sackOK,eol], length 0
  11. 23:01:01.583969 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542175584 ecr 0,sackOK,eol], length 0
  12. 23:01:01.587366 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  13. 23:01:01.588288 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  14. 23:01:02.188909 IP 192.168.0.104.49237 > 192.168.0.100.http: Flags [S], seq 2963182066, win 65535, options [mss 1460,sackOK,eol], length 0
  15. 23:01:02.193141 IP 192.168.0.104.49237 > 192.168.0.100.http: Flags [R], seq 2963182067, win 0, length 0
  16. 23:01:02.491342 IP 192.168.0.104.49238 > 192.168.0.100.http: Flags [S], seq 3695174422, win 65535, options [mss 1460,sackOK,eol], length 0
  17. 23:01:02.495508 IP 192.168.0.104.49238 > 192.168.0.100.http: Flags [R], seq 3695174423, win 0, length 0
  18. 23:01:02.593538 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542176588 ecr 0,sackOK,eol], length 0
  19. 23:01:02.593942 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542176588 ecr 0,sackOK,eol], length 0
  20. 23:01:02.599365 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  21. 23:01:02.599895 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  22. 23:01:03.603935 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542177594 ecr 0,sackOK,eol], length 0
  23. 23:01:03.604433 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542177594 ecr 0,sackOK,eol], length 0
  24. 23:01:03.612425 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  25. 23:01:03.612782 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  26. 23:01:04.613529 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542178599 ecr 0,sackOK,eol], length 0
  27. 23:01:04.614901 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542178599 ecr 0,sackOK,eol], length 0
  28. 23:01:04.620966 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  29. 23:01:04.621323 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  30. 23:01:06.630884 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542180606 ecr 0,sackOK,eol], length 0
  31. 23:01:06.632457 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542180606 ecr 0,sackOK,eol], length 0
  32. 23:01:06.634838 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  33. 23:01:06.636489 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  34. 23:01:11.143034 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,sackOK,eol], length 0
  35. 23:01:11.143535 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,sackOK,eol], length 0
  36. 23:01:11.150977 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  37. 23:01:11.151424 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  38. 23:01:18.380835 IP 192.168.0.104.49237 > 192.168.0.100.http: Flags [S], seq 2963182066, win 65535, options [mss 1460,sackOK,eol], length 0
  39. 23:01:18.384861 IP 192.168.0.104.49237 > 192.168.0.100.http: Flags [R], seq 2963182067, win 0, length 0
  40. 23:01:18.679482 IP 192.168.0.104.49238 > 192.168.0.100.http: Flags [S], seq 3695174422, win 65535, options [mss 1460,sackOK,eol], length 0
  41. 23:01:18.684215 IP 192.168.0.104.49238 > 192.168.0.100.http: Flags [R], seq 3695174423, win 0, length 0
  42. 23:01:19.284740 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,sackOK,eol], length 0
  43. 23:01:19.289206 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,sackOK,eol], length 0
  44. 23:01:19.289595 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  45. 23:01:19.293538 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  46. 23:01:35.821096 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [S], seq 1736080248, win 65535, options [mss 1460,sackOK,eol], length 0
  47. 23:01:35.821611 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [S], seq 1918992786, win 65535, options [mss 1460,sackOK,eol], length 0
  48. 23:01:35.828430 IP 192.168.0.104.49254 > 192.168.0.100.http: Flags [R], seq 1736080249, win 0, length 0
  49. 23:01:35.831771 IP 192.168.0.104.49253 > 192.168.0.100.http: Flags [R], seq 1918992787, win 0, length 0
  50. 23:01:40.834295 ARP, Reply 192.168.0.104 is-at 84:85:06:b5:aa:32 (oui Unknown), length 46
  51. 23:01:50.502252 IP 192.168.0.104.49237 > 192.168.0.100.http: Flags [S], seq 2963182066, win 65535, options [mss 1460,sackOK,eol], length 0
  52. 23:01:50.506775 IP 192.168.0.104.49237 > 192.168.0.100.http: Flags [R], seq 2963182067, win 0, length 0
  53. 23:01:51.003130 IP 192.168.0.104.49238 > 192.168.0.100.http: Flags [S], seq 3695174422, win 65535, options [mss 1460,sackOK,eol], length 0
  54. 23:01:51.005776 IP 192.168.0.104.49238 > 192.168.0.100.http: Flags [R], seq 3695174423, win 0, length 0
  55. 23:01:58.553078 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [S], seq 3996547685, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542232309 ecr 0,sackOK,eol], length 0
  56. 23:01:58.553677 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [S], seq 2247561476, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542232312 ecr 0,sackOK,eol], length 0
  57. 23:01:58.560843 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [R], seq 3996547686, win 0, length 0
  58. 23:01:58.561188 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [R], seq 2247561477, win 0, length 0
  59. 23:01:59.658863 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [S], seq 2247561476, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542233403 ecr 0,sackOK,eol], length 0
  60. 23:01:59.659280 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [S], seq 3996547685, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542233403 ecr 0,sackOK,eol], length 0
  61. 23:01:59.664164 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [R], seq 2247561477, win 0, length 0
  62. 23:01:59.665888 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [R], seq 3996547686, win 0, length 0
  63. 23:02:00.670732 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [S], seq 2247561476, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542234407 ecr 0,sackOK,eol], length 0
  64. 23:02:00.675661 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [S], seq 3996547685, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542234407 ecr 0,sackOK,eol], length 0
  65. 23:02:00.678296 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [R], seq 2247561477, win 0, length 0
  66. 23:02:00.681429 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [R], seq 3996547686, win 0, length 0
  67. 23:02:01.680721 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [S], seq 2247561476, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542235414 ecr 0,sackOK,eol], length 0
  68. 23:02:01.681300 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [S], seq 3996547685, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542235414 ecr 0,sackOK,eol], length 0
  69. 23:02:01.686587 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [R], seq 2247561477, win 0, length 0
  70. 23:02:01.689900 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [R], seq 3996547686, win 0, length 0
  71. 23:02:02.687807 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [S], seq 2247561476, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542236416 ecr 0,sackOK,eol], length 0
  72. 23:02:02.688309 IP 192.168.0.104.49255 > 192.168.0.100.http: Flags [S], seq 3996547685, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 542236416 ecr 0,sackOK,eol], length 0
  73. 23:02:02.692109 IP 192.168.0.104.49256 > 192.168.0.100.http: Flags [R], seq 2247561477, win 0, length 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement