Журнал лабораторных работ

Содержание

Журнал

Среда (12/14/11)

/dev/ttyp0
12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:41
#netcat -z 192.168.30.126 1024

12:13:47
#netcat -z 192.168.30.126 1024 -vv
invalid port vv : Invalid argument
12:13:47
#netcat -z 192.168.30.126 1024 -vv
invalid port vv : Invalid argument
12:13:47
#netcat -z 192.168.30.126 1024 -vv
invalid port vv : Invalid argument
12:13:47
#netcat -z 192.168.30.126 1024 -vv
invalid port vv : Invalid argument
12:13:47
#netcat -z 192.168.30.126 1024 -vv
invalid port vv : Invalid argument
12:13:47
#netcat -z 192.168.30.126 1024 -vv
invalid port vv : Invalid argument
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:52
#netcat -z -vv.168.30.126 1024
192.168.30.126: inverse host lookup failed: Unknown host
(UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused
 sent 0, rcvd 0
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:13:59
#netcat -z -vv 192.168.30.62
192.168.30.62: inverse host lookup failed: Unknown host
no port[s] to connect to
12:14:20
#cd

12:14:20
#cd

12:14:20
#cd

12:14:20
#cd

12:14:20
#cd

12:14:20
#cd

12:14:20
#cd

12:14:20
#cd

12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:14:50
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes
13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446>
13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446>
13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591>
13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592>
13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220>
13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235>
13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113>
13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238>
...
13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394>
13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264>
13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494>
13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364>
13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594>
^C
112 packets captured
115 packets received by filter
0 packets dropped by kernel
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:15:08
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09
#tcpdump src dst 192.168.30.62 -vv
tcpdump: syntax error
12:18:09