Skip to content

Instantly share code, notes, and snippets.

Created May 22, 2013 02:33
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save anonymous/bc98d1d6f8c94dd0df50 to your computer and use it in GitHub Desktop.
Save anonymous/bc98d1d6f8c94dd0df50 to your computer and use it in GitHub Desktop.
tcpdump
swiftfox@xenb:/etc/udev/rules.d$ sudo tcpdump -i eth2 -n host 67.22.85.13
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth2, link-type EN10MB (Ethernet), capture size 65535 bytes
20:31:32.318883 IP 67.22.85.13.42886 > 8.8.8.8.80: Flags [S], seq 3900966672, win 14600, options [mss 1460,sackOK,TS val 204580 ecr 0,nop,wscale 7], length 0
20:31:33.317415 IP 67.22.85.13.42886 > 8.8.8.8.80: Flags [S], seq 3900966672, win 14600, options [mss 1460,sackOK,TS val 204830 ecr 0,nop,wscale 7], length 0
^C
2 packets captured
2 packets received by filter
0 packets dropped by kernel
swiftfox@xenb:/etc/udev/rules.d$ sudo tcpdump -i eth2 -n host 67.22.85.13
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth2, link-type EN10MB (Ethernet), capture size 65535 bytes
20:31:56.255743 IP 67.22.85.13.36119 > 8.8.8.8.53: 54588+ AAAA? google.ca. (27)
20:31:56.340396 IP 8.8.8.8.53 > 67.22.85.13.36119: 54588 1/0/0 AAAA 2607:f8b0:400b:806::101f (55)
20:31:56.340861 IP 67.22.85.13.51852 > 8.8.8.8.53: 40814+ A? google.ca. (27)
20:31:56.440620 IP 8.8.8.8.53 > 67.22.85.13.51852: 40814 3/0/0 A 173.194.43.88, A 173.194.43.87, A 173.194.43.95 (75)
20:31:56.441205 IP 67.22.85.13.58686 > 173.194.43.88.80: Flags [S], seq 873742106, win 14600, options [mss 1460,sackOK,TS val 210610 ecr 0,nop,wscale 7], length 0
20:31:56.482445 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [S.], seq 2216469925, ack 873742107, win 62392, options [mss 1430,sackOK,TS val 3349270110 ecr 210610,nop,wscale 6], length 0
20:31:56.482715 IP 67.22.85.13.58686 > 173.194.43.88.80: Flags [.], ack 1, win 115, options [nop,nop,TS val 210621 ecr 3349270110], length 0
20:31:56.482902 IP 67.22.85.13.58686 > 173.194.43.88.80: Flags [P.], seq 1:160, ack 1, win 115, options [nop,nop,TS val 210621 ecr 3349270110], length 159
20:31:56.543638 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [.], ack 160, win 992, options [nop,nop,TS val 3349270171 ecr 210621], length 0
20:31:56.574662 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349270203 ecr 210621], length 538
20:31:56.836698 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349270203 ecr 210621], length 538
20:31:57.220740 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349270848 ecr 210621], length 538
20:31:58.510792 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349272139 ecr 210621], length 538
20:32:01.091727 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349274719 ecr 210621], length 538
20:32:01.347697 ARP, Request who-has 67.22.85.13 tell 67.22.85.2, length 46
20:32:01.348046 ARP, Reply 67.22.85.13 is-at 08:00:27:28:c7:c6, length 46
20:32:01.490784 ARP, Request who-has 67.22.85.13 tell 67.22.85.1, length 46
20:32:01.491124 ARP, Reply 67.22.85.13 is-at 08:00:27:28:c7:c6, length 46
20:32:06.251711 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349279879 ecr 210621], length 538
20:32:16.251727 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349289879 ecr 210621], length 538
20:32:26.251812 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349299879 ecr 210621], length 538
20:32:36.251777 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349309879 ecr 210621], length 538
20:32:41.261009 ARP, Request who-has 67.22.85.13 tell 67.22.85.1, length 46
20:32:41.261357 ARP, Reply 67.22.85.13 is-at 08:00:27:28:c7:c6, length 46
20:32:46.251775 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349319879 ecr 210621], length 538
20:32:56.251773 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349329880 ecr 210621], length 538
20:33:06.252774 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [P.], seq 1:539, ack 160, win 992, options [nop,nop,TS val 3349339880 ecr 210621], length 538
20:33:08.251870 IP 67.22.85.13.58686 > 173.194.43.88.80: Flags [F.], seq 160, ack 1, win 115, options [nop,nop,TS val 228563 ecr 3349270171], length 0
20:33:08.311576 IP 173.194.43.88.80 > 67.22.85.13.58686: Flags [F.], seq 539, ack 161, win 992, options [nop,nop,TS val 3349341939 ecr 228563], length 0
20:33:08.311936 IP 67.22.85.13.58686 > 173.194.43.88.80: Flags [R], seq 873742267, win 0, length 0
^C
30 packets captured
31 packets received by filter
0 packets dropped by kernel
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment