/l3/users/12-12-2011/NT-BSDnet/freebsd1.net.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 :22 :23 :24 :25 :26 :27 :28 :29 :30 :31 :32 :33 :34 :35 |
|
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024
![]() |
#netcat -z 192.168.30.126 1024 -vv
![]() invalid port vv : Invalid argument |
#netcat -z 192.168.30.126 1024 -vv
![]() invalid port vv : Invalid argument |
#netcat -z 192.168.30.126 1024 -vv
![]() invalid port vv : Invalid argument |
#netcat -z 192.168.30.126 1024 -vv
![]() invalid port vv : Invalid argument |
#netcat -z 192.168.30.126 1024 -vv
![]() invalid port vv : Invalid argument |
#netcat -z 192.168.30.126 1024 -vv
![]() invalid port vv : Invalid argument |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv.168.30.126 1024
![]() 192.168.30.126: inverse host lookup failed: Unknown host (UNKNOWN) [192.168.30.126] 1024 (?) : Connection refused sent 0, rcvd 0 |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#netcat -z -vv 192.168.30.62
![]() 192.168.30.62: inverse host lookup failed: Unknown host no port[s] to connect to |
#cd
![]() |
#cd
![]() |
#cd
![]() |
#cd
![]() |
#cd
![]() |
#cd
![]() |
#cd
![]() |
#cd
|
#tcpdump
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re1, link-type EN10MB (Ethernet), capture size 96 bytes 13:14:56.570738 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 3162358270:3162358382(112) ack 2801881563 win 8326 <nop,nop,timestamp 3222517591 25025446> 13:14:56.577799 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 112:224(112) ack 1 win 8326 <nop,nop,timestamp 3222517592 25025446> 13:14:56.583699 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 112 win 36200 <nop,nop,timestamp 25025463 3222517591> 13:14:56.585091 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 224 win 36200 <nop,nop,timestamp 25025463 3222517592> 13:14:57.040635 IP 192.168.30.65.2526 > 192.168.30.190.ssh: P 1603018232:1603018280(48) ack 1876516200 win 62848 <nop,nop,timestamp 25223235 16726220> 13:14:57.061990 IP 192.168.30.190.ssh > 192.168.30.65.2526: P 1:49(48) ack 48 win 341 <nop,nop,timestamp 16727113 25223235> 13:14:57.068738 IP 192.168.30.65.2526 > 192.168.30.190.ssh: . ack 49 win 62848 <nop,nop,timestamp 25223238 16727113> 13:14:57.142555 IP 192.168.30.190.ssh > 192.168.30.65.2526: . 49:1497(1448) ack 48 win 341 <nop,nop,timestamp 16727134 25223238> ... 13:15:04.597936 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 12536 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:04.597961 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13056 win 47784 <nop,nop,timestamp 25026264 3222518394> 13:15:05.593035 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13056:13616(560) ack 1 win 8326 <nop,nop,timestamp 3222518494 25026264> 13:15:05.598578 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13616 win 47784 <nop,nop,timestamp 25026364 3222518494> 13:15:06.592884 IP 192.168.30.126.ssh > 192.168.30.65.2173: P 13616:13920(304) ack 1 win 8326 <nop,nop,timestamp 3222518594 25026364> 13:15:06.596562 IP 192.168.30.65.2173 > 192.168.30.126.ssh: . ack 13920 win 47784 <nop,nop,timestamp 25026464 3222518594> ^C 112 packets captured 115 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.30.126 dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
#tcpdump src dst 192.168.30.62 -vv
![]() tcpdump: syntax error |
|