linux水滴怎么抓包,tcpdump 抓包

两台虚拟机:192.168.96.129和192.168.96.137
在192.168.96.129上输入:telnet 192.168.96.137
在192.168.96.137进行:tcpdump -S
host 192.168.96.137 and 192.168.96.129
可以得到:
16:02:55.999181IP
192.168.96.129.47905>
192.168.96.137.telnet: Flags [S],seq
3825850275,win 14600, options [mss
1460,sackOK,TS val 28524348 ecr 0,nop,wscale 7], length0
16:02:56.012980IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [S.],
seq 1008747909, ack 3825850276,win 14480,
options [mss 1460,sackOK,TS val 77550622 ecr 28524348,nop,wscale
7],length 0
16:02:56.035037IP
192.168.96.129.47905>
192.168.96.137.telnet: Flags [.], ack 1008747910, win 115,
options[nop,nop,TS val 28524379 ecr 77550622], length 0
16:02:56.035176IP
192.168.96.129.47905>192.168.96.137.telnet:
Flags [P.],seq
3825850276:3825850303,
ack1008747910, win 115, options [nop,nop,TS val 28524379 ecr
77550622], length 27
16:02:56.035198IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [.], ack
3825850303, win 114, options[nop,nop,TS val
77550644 ecr 28524379], length 0
16:03:11.409298IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [P.], seq
1008747910:1008747922, ack 3825850303, win 114,
options[nop,nop,TS val 77566019 ecr 28524379], length 12
16:03:11.410099IP
192.168.96.129.47905>192.168.96.137.telnet:
Flags [.], ack 1008747922, win 115, options [nop,nop,TSval 28539761
ecr 77566019], length 0
16:03:11.410786IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [P.],seq
1008747922:1008747961, ack 3825850303, win 114,
options [nop,nop,TS val 77566020ecr 28539761], length 39
16:03:11.412447IP
192.168.96.129.47905>
192.168.96.137.telnet: Flags [.], ack 1008747961, win 115,
options[nop,nop,TS val 28539763 ecr 77566020], length 0
16:03:11.412491IP
192.168.96.129.47905>
192.168.96.137.telnet: Flags [P.],seq
3825850303:3825850437,
ack1008747961, win 115, options [nop,nop,TS val 28539764 ecr
77566020], length 134
16:03:11.412840IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [.], ack
3825850437, win 122, options[nop,nop,TS val
77566021 ecr 28539764], length 0
16:03:11.432260IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [P.], seq
1008747961:1008747964, ack 3825850437, win 122,
options[nop,nop,TS val 77566041 ecr 28539764], length 3
16:03:11.432971IP
192.168.96.129.47905>
192.168.96.137.telnet: Flags [P.], seq
3825850437:3825850440, ack
1008747964, win 115,options [nop,nop,TS val 28539785 ecr 77566041],
length 3
16:03:11.433675IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [P.], seq
1008747964:1008748042, ack3825850440,win 122,
options [nop,nop,TS val 77566043 ecr 28539785], length
78
16:03:11.434013IP
192.168.96.129.47905>192.168.96.137.telnet:
Flags [P.], seq
3825850440:3825850443, ack
1008748042, win 115,options [nop,nop,TS val 28539786 ecr 77566043],
length 3
16:03:11.513311IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [.], ack
3825850443, win 122, options[nop,nop,TS val
77566123 ecr 28539786], length 0
16:03:11.647916IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [P.], seq
1008748042:1008748049, ack3825850443,win 122,
options [nop,nop,TS val 77566257 ecr 28539786], length 7
16:03:11.689252IP
192.168.96.129.47905>
192.168.96.137.telnet: Flags [.], ack 1008748049, win 115,
options[nop,nop,TS val 28540041 ecr 77566257], length 0
16:06:11.524542IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [F.], seq 1008748049, ack
3825850443,win 122, options [nop,nop,TS val
77746133 ecr 28540041], length 0
16:06:11.553639IP
192.168.96.129.47905>
192.168.96.137.telnet: Flags [F.], seq
3825850443, ack 1008748050,
win 115, options [nop,nop,TSval 28719901 ecr 77746133], length
0
16:06:11.553706IP 192.168.96.137.telnet >
192.168.96.129.47905: Flags [.], ack
3825850444, win 122, options[nop,nop,TS val
77746163 ecr 28719901], length 0