Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- @localhost ~]$ sudo tcpdump -n -i any tcp port 80 -c 50
- tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
- listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
- 08:25:22.005400 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [S], seq 542973695, win 64240, options [mss 1460,sackOK,TS val 1707597488 ecr 0,nop,wscale 7], length 0
- 08:25:22.005727 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [S.], seq 149944399, ack 542973696, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
- 08:25:22.005797 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
- 08:25:22.006582 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [P.], seq 1:196, ack 1, win 502, length 195: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/sensors HTTP/1.1
- 08:25:22.006804 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [.], ack 196, win 3650, length 0
- 08:25:22.015192 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [P.], seq 1:1242, ack 196, win 3650, length 1241: HTTP: HTTP/1.1 200 OK
- 08:25:22.015241 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [.], ack 1242, win 501, length 0
- 08:25:22.015525 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [F.], seq 1242, ack 196, win 3650, length 0
- 08:25:22.016088 IP 192.168.1.152.49102 > 192.168.1.128.http: Flags [F.], seq 196, ack 1243, win 501, length 0
- 08:25:22.016275 IP 192.168.1.128.http > 192.168.1.152.49102: Flags [.], ack 197, win 3650, length 0
- 08:25:24.006482 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [S], seq 97404777, win 64240, options [mss 1460,sackOK,TS val 1707599489 ecr 0,nop,wscale 7], length 0
- 08:25:24.006635 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [S], seq 463147561, win 64240, options [mss 1460,sackOK,TS val 1707599489 ecr 0,nop,wscale 7], length 0
- 08:25:24.006786 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [S.], seq 4075148649, ack 97404778, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
- 08:25:24.006848 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
- 08:25:24.006953 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [S.], seq 732846308, ack 463147562, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
- 08:25:24.006976 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
- 08:25:24.007257 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [P.], seq 1:195, ack 1, win 502, length 194: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/lights HTTP/1.1
- 08:25:24.007629 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [P.], seq 1:195, ack 1, win 502, length 194: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/groups HTTP/1.1
- 08:25:24.007722 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], ack 195, win 3650, length 0
- 08:25:24.007814 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [.], ack 195, win 3650, length 0
- 08:25:24.021104 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], seq 1:1461, ack 195, win 3650, length 1460: HTTP: HTTP/1.1 200 OK
- 08:25:24.021156 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 1461, win 501, length 0
- 08:25:24.021180 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], seq 1461:2921, ack 195, win 3650, length 1460: HTTP
- 08:25:24.021196 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 2921, win 496, length 0
- 08:25:24.021275 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [P.], seq 2921:4149, ack 195, win 3650, length 1228: HTTP
- 08:25:24.021285 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 4149, win 490, length 0
- 08:25:24.021337 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [P.], seq 4149:4952, ack 195, win 3650, length 803: HTTP
- 08:25:24.021355 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [.], ack 4952, win 501, length 0
- 08:25:24.021748 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [F.], seq 4952, ack 195, win 3650, length 0
- 08:25:24.022226 IP 192.168.1.152.49104 > 192.168.1.128.http: Flags [F.], seq 195, ack 4953, win 501, length 0
- 08:25:24.022403 IP 192.168.1.128.http > 192.168.1.152.49104: Flags [.], ack 196, win 3650, length 0
- 08:25:24.035362 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [P.], seq 1:944, ack 195, win 3650, length 943: HTTP: HTTP/1.1 200 OK
- 08:25:24.035428 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [.], ack 944, win 501, length 0
- 08:25:24.035790 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [F.], seq 944, ack 195, win 3650, length 0
- 08:25:24.036320 IP 192.168.1.152.49106 > 192.168.1.128.http: Flags [F.], seq 195, ack 945, win 501, length 0
- 08:25:24.036511 IP 192.168.1.128.http > 192.168.1.152.49106: Flags [.], ack 196, win 3650, length 0
- 08:25:28.005726 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [S], seq 2318630069, win 64240, options [mss 1460,sackOK,TS val 1707603488 ecr 0,nop,wscale 7], length 0
- 08:25:28.006057 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [S.], seq 2107089461, ack 2318630070, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
- 08:25:28.006103 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
- 08:25:28.006917 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [P.], seq 1:196, ack 1, win 502, length 195: HTTP: GET /api/5y6p3LMrRc0JjykpHiylBcTjxN9r3pPNmt6wXPFo/sensors HTTP/1.1
- 08:25:28.007154 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [.], ack 196, win 3650, length 0
- 08:25:28.015240 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [P.], seq 1:1242, ack 196, win 3650, length 1241: HTTP: HTTP/1.1 200 OK
- 08:25:28.015291 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [.], ack 1242, win 501, length 0
- 08:25:28.015581 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [F.], seq 1242, ack 196, win 3650, length 0
- 08:25:28.015907 IP 192.168.1.152.49110 > 192.168.1.128.http: Flags [F.], seq 196, ack 1243, win 501, length 0
- 08:25:28.016078 IP 192.168.1.128.http > 192.168.1.152.49110: Flags [.], ack 197, win 3650, length 0
- 08:25:30.012424 IP 192.168.1.152.49112 > 192.168.1.128.http: Flags [S], seq 3290775241, win 64240, options [mss 1460,sackOK,TS val 1707605495 ecr 0,nop,wscale 7], length 0
- 08:25:30.012730 IP 192.168.1.128.http > 192.168.1.152.49112: Flags [S.], seq 1005449602, ack 3290775242, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 3], length 0
- 08:25:30.012766 IP 192.168.1.152.49112 > 192.168.1.128.http: Flags [.], ack 1, win 502, length 0
- 08:25:30.013708 IP 192.168.1.152.49114 > 192.168.1.128.http: Flags [S], seq 652608442, win 64240, options [mss 1460,sackOK,TS val 1707605496 ecr 0,nop,wscale 7], length 0
- 50 packets captured
- 50 packets received by filter
- 0 packets dropped by kernel
Add Comment
Please, Sign In to add comment