linux抓包
tcpdump 命令
tcpdump
命令 :
介绍:抓包工具(流向)
格式:tcpdump [option]
用法:
-nn :IP显示
-c # :指定抓包次数
-i eth0 :指定网卡
-w file :包内容文件(二进制)
-w 1.cap 可以下载到windows上,然后用wireshark查看
tcpdump -r :读文件内容
-s0 :抓完整包
port # :指定端口
tcp
udp
host :主机
用and连接
[root@localhost ~]# tcpdump -nn -i ens33
...
20:51:25.794938 IP 192.168.127.128.22 > 192.168.127.1.55489: Flags [P.], seq 89180:89440, ack 1, win 264, length 260
20:51:25.795177 IP 192.168.127.1.55489 > 192.168.127.128.22: Flags [.], ack 89180, win 2049, length 0
20:51:25.795210 IP 192.168.127.128.22 > 192.168.127.1.55489: Flags [P.], seq 89440:89604, ack 1, win 264, length 164
20:51:25.795496 IP 192.168.127.1.55489 > 192.168.127.128.22: Flags [.], ack 89604, win 2048, length 0
20:51:25.795585 IP 192.168.127.128.22 > 192.168.127.1.55489: Flags [P.], seq 89604:89976, ack 1, win 264, length 372
20:51:25.820948 IP 192.168.127.1.55489 > 192.168.127.128.22: Flags [.], ack 118616, win 2047, length 0
20:51:25.820974 IP 192.168.127.128.22 > 192.168.127.1.55489: Flags [P.], seq 118892:119056, ack 53, win 264, length 164
20:51:25.821148 IP 192.168.127.128.22 > 192.168.127.1.55489: Flags [P.], seq 119056:119332, ack 53, win 264, length 276
20:51:25.821357 IP 192.168.127.1.55489 > 192.168.127.128.22: Flags [.], ack 119056, win 2053, length 0
20:51:25.821380 IP 192.168.127.128.22 > 192.168.127.1.55489: Flags [P.], seq 119332:119496, ack 53, win 264, length 164
20:51:25.821502 IP 192.168.127.128.22 > 192.168.127.1.55489: Flags [P.], seq 119496:119772, ack 53, win 264, length 276
20:51:25.821583 IP 192.168.127.1.55489 > 192.168.127.128.22: Flags [P.], seq 53:105, ack 119056, win 2053, length 52
^C
791 packets captured
791 packets received by filter
0 packets dropped by kernel
tshark 命令
tshark :抓包工具(windows linux) yum install -y wireshark
tshark -n -t a -R http.request -T fields -e "frame.time" -e "ip.src" -e "http.host" -e "http.request.method" -e "http.request.uri"
最后更新于
这有帮助吗?