tcpdump命令打印抓包信息
下面是在服务器抓取打印服务端7701端口打印
root@gb:/home/gb
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500inet 10.250.251.197 netmask 255.255.255.0 broadcast 10.250.251.255inet6 fe80::76fe:48ff:fe94:5a5 prefixlen 64 scopeid 0x20<link>ether 74:fe:48:94:05:a5 txqueuelen 1000 (Ethernet)RX packets 126056 bytes 52701994 (52.7 MB)RX errors 0 dropped 21706 overruns 0 frame 0TX packets 115330 bytes 56647046 (56.6 MB)TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0device memory 0xfea00000-fea7fffflo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536inet 127.0.0.1 netmask 255.0.0.0inet6 ::1 prefixlen 128 scopeid 0x10<host>loop txqueuelen 1000 (Local Loopback)RX packets 26915 bytes 1965240 (1.9 MB)RX errors 0 dropped 0 overruns 0 frame 0TX packets 26915 bytes 1965240 (1.9 MB)TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0root@gb:/home/gbtcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
17:01:07.765938 IP (tos 0x0, ttl 124, id 47256, offset 0, flags [DF], proto TCP (6), length 542)172.16.24.84.54153 > gb.7701: Flags [P.], cksum 0x2ddb (correct), seq 725546267:725546769, ack 2607363900, win 1025, length 5020x0000: 4500 021e b898 4000 7c06 791d ac10 1854 E.....@.|.y....T0x0010: 0afa fbc5 d389 1e15 2b3e f51b 9b69 373c ........+>...i7<0x0020: 5018 0401 2ddb 0000 4745 5420 2f64 6d61 P...-...GET./dma0x0030: 7069 2f6d 6861 6e64 6c65 722f 7374 6174 pi/mhandler/stat0x0040: 7573 2048 5454 502f 312e 310d 0a48 6f73 us.HTTP/1.1..Hos0x0050: 743a 2031 302e 3235 302e 3235 312e 3139 t:.10.250.251.190x0060: 373a 3737 3031 0d0a 436f 6e6e 6563 7469 7:7701..Connecti0x0070: 6f6e 3a20 6b65 6570 2d61 6c69 7665 0d0a on:.keep-alive..0x0080: 5570 6772 6164 652d 496e 7365 6375 7265 Upgrade-Insecure0x0090: 2d52 6571 7565 7374 733a 2031 0d0a 5573 -Requests:.1..Us0x00a0: 6572 2d41 6765 6e74 3a20 4d6f 7a69 6c6c er-Agent:.Mozill0x00b0: 612f 352e 3020 2857 696e 646f 7773 204e a/5.0.(Windows.N0x00c0: 5420 3130 2e30 3b20 5769 6e36 343b 2078 T.10.0;.Win64;.x0x00d0: 3634 2920 4170 706c 6557 6562 4b69 742f 64).AppleWebKit/0x00e0: 3533 372e 3336 2028 4b48 544d 4c2c 206c 537.36.(KHTML,.l0x00f0: 696b 6520 4765 636b 6f29 2043 6872 6f6d ike.Gecko).Chrom0x0100: 652f 3133 382e 302e 302e 3020 5361 6661 e/138.0.0.0.Safa0x0110: 7269 2f35 3337 2e33 3620 4564 672f 3133 ri/537.36.Edg/130x0120: 382e 302e 302e 300d 0a41 6363 6570 743a 8.0.0.0..Accept:0x0130: 2074 6578 742f 6874 6d6c 2c61 7070 6c69 .text/html,appli0x0140: 6361 7469 6f6e 2f78 6874 6d6c 2b78 6d6c cation/xhtml+xml0x0150: 2c61 7070 6c69 6361 7469 6f6e 2f78 6d6c ,application/xml0x0160: 3b71 3d30 2e39 2c69 6d61 6765 2f61 7669 ;q=0.9,image/avi0x0170: 662c 696d 6167 652f 7765 6270 2c69 6d61 f,image/webp,ima0x0180: 6765 2f61 706e 672c 2a2f 2a3b 713d 302e ge/apng,*/*;q=0.0x0190: 382c 6170 706c 6963 6174 696f 6e2f 7369 8,application/si0x01a0: 676e 6564 2d65 7863 6861 6e67 653b 763d gned-exchange;v=0x01b0: 6233 3b71 3d30 2e37 0d0a 4163 6365 7074 b3;q=0.7..Accept0x01c0: 2d45 6e63 6f64 696e 673a 2067 7a69 702c -Encoding:.gzip,0x01d0: 2064 6566 6c61 7465 0d0a 4163 6365 7074 .deflate..Accept0x01e0: 2d4c 616e 6775 6167 653a 207a 682d 434e -Language:.zh-CN0x01f0: 2c7a 683b 713d 302e 392c 656e 3b71 3d30 ,zh;q=0.9,en;q=00x0200: 2e38 2c65 6e2d 4742 3b71 3d30 2e37 2c65 .8,en-GB;q=0.7,e0x0210: 6e2d 5553 3b71 3d30 2e36 0d0a 0d0a n-US;q=0.6....
17:01:07.766971 IP (tos 0x0, ttl 64, id 32769, offset 0, flags [DF], proto TCP (6), length 286)gb.7701 > 172.16.24.84.54153: Flags [P.], cksum 0xcc34 (incorrect -> 0x4376), seq 1:247, ack 502, win 501, length 2460x0000: 4500 011e 8001 4000 4006 eeb4 0afa fbc5 E.....@.@.......0x0010: ac10 1854 1e15 d389 9b69 373c 2b3e f711 ...T.....i7<+>..0x0020: 5018 01f5 cc34 0000 4854 5450 2f31 2e31 P....4..HTTP/1.10x0030: 2032 3030 204f 4b0d 0a43 6f6e 7465 6e74 .200.OK..Content0x0040: 2d4c 656e 6774 683a 2031 3938 2020 2020 -Length:.198....0x0050: 2020 2020 0d0a 0d0a 7b22 6563 6f64 6522 ........{"ecode"0x0060: 3a30 2c22 6461 7461 223a 5b7b 2263 635f :0,"data":[{"cc_0x0070: 7363 616c 696e 6722 3a22 3030 3030 227d scaling":"0000"}0x0080: 2c7b 2263 635f 6c6f 636b 223a 2230 3030 ,{"cc_lock":"0000x0090: 3022 7d2c 7b22 6169 725f 6c6f 636b 223a 0"},{"air_lock":0x00a0: 2231 3022 7d2c 7b22 7265 7475 726e 5f63 "10"},{"return_c0x00b0: 6172 6422 3a22 3030 3030 227d 2c7b 2263 ard":"0000"},{"c0x00c0: 6f6e 6e65 6374 6f72 223a 2230 302c 3030 onnector":"00,000x00d0: 2c30 302c 3030 227d 2c7b 2273 6572 766f ,00,00"},{"servo0x00e0: 223a 2230 227d 2c7b 2263 6475 5f73 7769 ":"0"},{"cdu_swi0x00f0: 7463 6822 3a22 227d 2c7b 2264 6331 5f73 tch":""},{"dc1_s0x0100: 7769 7463 6822 3a22 227d 2c7b 2264 6332 witch":""},{"dc20x0110: 5f73 7769 7463 6822 3a22 227d 5d7d _switch":""}]}
tcpdump选项解释
-a 将网络地址和广播地址转变成名字;-d 将匹配信息包的代码以人们能够理解的汇编格式给出;-dd 将匹配信息包的代码以c语言程序段的格式给出;-ddd 将匹配信息包的代码以十进制的形式给出;-e 在输出行打印出数据链路层的头部信息;-f 将外部的Internet地址以数字的形式打印出来;-l 使标准输出变为缓冲行形式;-n 不把网络地址转换成名字;-t 在输出的每一行不打印时间戳;-v 输出一个稍微详细的信息,例如在ip包中可以包括ttl和服务类型的信息;-vv 输出详细的报文信息;-c 在收到指定的包的数目后,tcpdump就会停止;-F 从指定的文件中读取表达式,忽略其它的表达式;-i 指定监听的网络接口;-r 从指定的文件中读取包(这些包一般通过-w选项产生);-w 直接将包写入文件中,并不分析和打印出来;-T 将监听到的包直接解释为指定的类型的报文,常见的类型有rpc(远程过程调用)和snmp(简单网络管理协议)-A ASCII格式 输出打印-X 十六进制 + ASCII格式输出打印