Guest User

Untitled

a guest
Sep 5th, 2019
83
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.60 KB | None | 0 0
  1. @localhost ~]$ sudo tcpdump -n -i any tcp port 80 -c 50
  2. tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
  3. listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
  4. 08:25:22.005400 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [S], seq 542973695, win 64240, options [mss 1460,sackOK,TS val 1707597488 ecr 0,nop,wscale 7], length 0
  5. 08:25:22.005727 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [S.], seq 149944399, ack 542973696, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
  6. 08:25:22.005797 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
  7. 08:25:22.006582 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [P.], seq 1:196, ack 1, win 502, length 195: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/sensors HTTP/1.1
  8. 08:25:22.006804 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [.], ack 196, win 3650, length 0
  9. 08:25:22.015192 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [P.], seq 1:1242, ack 196, win 3650, length 1241: HTTP: HTTP/1.1 200 OK
  10. 08:25:22.015241 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [.], ack 1242, win 501, length 0
  11. 08:25:22.015525 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [F.], seq 1242, ack 196, win 3650, length 0
  12. 08:25:22.016088 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [F.], seq 196, ack 1243, win 501, length 0
  13. 08:25:22.016275 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [.], ack 197, win 3650, length 0
  14. 08:25:24.006482 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [S], seq 97404777, win 64240, options [mss 1460,sackOK,TS val 1707599489 ecr 0,nop,wscale 7], length 0
  15. 08:25:24.006635 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [S], seq 463147561, win 64240, options [mss 1460,sackOK,TS val 1707599489 ecr 0,nop,wscale 7], length 0
  16. 08:25:24.006786 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [S.], seq 4075148649, ack 97404778, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
  17. 08:25:24.006848 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
  18. 08:25:24.006953 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [S.], seq 732846308, ack 463147562, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
  19. 08:25:24.006976 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
  20. 08:25:24.007257 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [P.], seq 1:195, ack 1, win 502, length 194: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/lights HTTP/1.1
  21. 08:25:24.007629 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [P.], seq 1:195, ack 1, win 502, length 194: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/groups HTTP/1.1
  22. 08:25:24.007722 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], ack 195, win 3650, length 0
  23. 08:25:24.007814 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [.], ack 195, win 3650, length 0
  24. 08:25:24.021104 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], seq 1:1461, ack 195, win 3650, length 1460: HTTP: HTTP/1.1 200 OK
  25. 08:25:24.021156 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 1461, win 501, length 0
  26. 08:25:24.021180 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], seq 1461:2921, ack 195, win 3650, length 1460: HTTP
  27. 08:25:24.021196 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 2921, win 496, length 0
  28. 08:25:24.021275 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [P.], seq 2921:4149, ack 195, win 3650, length 1228: HTTP
  29. 08:25:24.021285 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 4149, win 490, length 0
  30. 08:25:24.021337 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [P.], seq 4149:4952, ack 195, win 3650, length 803: HTTP
  31. 08:25:24.021355 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 4952, win 501, length 0
  32. 08:25:24.021748 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [F.], seq 4952, ack 195, win 3650, length 0
  33. 08:25:24.022226 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [F.], seq 195, ack 4953, win 501, length 0
  34. 08:25:24.022403 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], ack 196, win 3650, length 0
  35. 08:25:24.035362 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [P.], seq 1:944, ack 195, win 3650, length 943: HTTP: HTTP/1.1 200 OK
  36. 08:25:24.035428 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [.], ack 944, win 501, length 0
  37. 08:25:24.035790 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [F.], seq 944, ack 195, win 3650, length 0
  38. 08:25:24.036320 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [F.], seq 195, ack 945, win 501, length 0
  39. 08:25:24.036511 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [.], ack 196, win 3650, length 0
  40. 08:25:28.005726 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [S], seq 2318630069, win 64240, options [mss 1460,sackOK,TS val 1707603488 ecr 0,nop,wscale 7], length 0
  41. 08:25:28.006057 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [S.], seq 2107089461, ack 2318630070, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
  42. 08:25:28.006103 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
  43. 08:25:28.006917 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [P.], seq 1:196, ack 1, win 502, length 195: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/sensors HTTP/1.1
  44. 08:25:28.007154 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [.], ack 196, win 3650, length 0
  45. 08:25:28.015240 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [P.], seq 1:1242, ack 196, win 3650, length 1241: HTTP: HTTP/1.1 200 OK
  46. 08:25:28.015291 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [.], ack 1242, win 501, length 0
  47. 08:25:28.015581 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [F.], seq 1242, ack 196, win 3650, length 0
  48. 08:25:28.015907 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [F.], seq 196, ack 1243, win 501, length 0
  49. 08:25:28.016078 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [.], ack 197, win 3650, length 0
  50. 08:25:30.012424 IP 192.168.1.152.49112 > 192.168.1.128.http: Flags [S], seq 3290775241, win 64240, options [mss 1460,sackOK,TS val 1707605495 ecr 0,nop,wscale 7], length 0
  51. 08:25:30.012730 IP 192.168.1.128.http > 192.168.1.152.49112: Flags [S.], seq 1005449602, ack 3290775242, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
  52. 08:25:30.012766 IP 192.168.1.152.49112 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
  53. 08:25:30.013708 IP 192.168.1.152.49114 > 192.168.1.128.http: Flags [S], seq 652608442, win 64240, options [mss 1460,sackOK,TS val 1707605496 ecr 0,nop,wscale 7], length 0
  54. 50 packets captured
  55. 50 packets received by filter
  56. 0 packets dropped by kernel
Add Comment
Please, Sign In to add comment