抓包软件学习
[root@vultr ~]# tcpdump -i eth0 -c 2 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 01:25:44.952654 IP 45.63.62.88.vultrusercontent.com.ssh > 27.38.238.130.cxws : Flags [P.], seq 2453249983:2453250179, ack 227453586, win 37, length 196 01:25:44.953148 IP 45.63.62.88.vultrusercontent.com.53759 > 108.61.10.10.choopa.net.domain : 63726+ PTR? 130.238.38.27.in-addr.arpa. (44) 2 packets captured 8 packets received by filter 0 packets dropped by kernel [root@vultr ~]# tcpdump -i eth0 -c 2 -nn tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 01:29:06.950182 IP 45.63.62.88.22 > 27.38.238.130.4673 : Flags [P.], seq 2453251891:2453252087, ack 227454630, win 37, length 196 01:29:06.950649 IP 45.63.62.88.22 > 27.38.238.130.4673 : Flags [P.], seq 196:376, ack 1, win 37, length 180 2 packet...