/l3/users/26-03-2012/NT-BSDnet/freebsd4.net.nt/root :1 :2 :3 :4 :5 :6 :7 :8 :9 :10 :11 :12 :13 :14 :15 :16 :17 :18 :19 :20 :21 |
|
#cat /dev/urandom| netcat -l -p 33383-33900
![]() ^C punt! |
#cat /dev/urandom| netcat -l -p 33383-33900
![]() ^C punt! |
#cat /dev/urandom| netcat -l -p 33383-33900
![]() ^C punt! |
#netcat -l -e /usr/local/bin/bash
![]() ^C punt! |
#netcat -l -e /usr/local/bin/bash
![]() ^C punt! |
#netcat -l -e /usr/local/bin/bash
![]() ^C punt! |
#netcat -l -e /usr/local/bin/bash
![]() ^C punt! |
#netcat -l -e /usr/local/bin/bash
![]() ^C punt! |
#netcat -l -e /usr/local/bin/bash
![]() ^C punt! |
#netcat -l -e /usr/local/bin/bash -p 3389
![]() ^C |
#netcat -l -e /usr/local/bin/bash -p 3389
![]() ^C |
#netcat -l -e /usr/local/bin/bash -p 3389
![]() ^C |
#netcat -l -e /usr/local/bin/bash -p 3389
![]() ^C |
#netcat -l -e /usr/local/bin/bash -p 3389
![]() ^C |
#netcat -l -e /usr/local/bin/bash -p 3389
![]() ^C |
#netcat -l -e /usr/local/bin/bash -p 3389 &
![]() [2] 3546 |
#netcat -l -e /usr/local/bin/bash -p 3389 &
![]() [2] 3546 |
#netcat -l -e /usr/local/bin/bash -p 3389 &
![]() [2] 3546 |
#netcat -l -e /usr/local/bin/bash -p 3389 &
![]() [2] 3546 |
#netcat -l -e /usr/local/bin/bash -p 3389 &
![]() [2] 3546 |
#netcat -l -e /usr/local/bin/bash -p 3389 &
[2] 3546 |
#sockstat -4
![]() USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root netcat 3546 0 tcp4 *:* *:* root netcat 3546 3 tcp4 *:3389 *:* root netcat 3511 3 tcp4 *:33383 *:* root sshd 1572 3 tcp4 192.168.13.24:22 192.168.13.253:4127 root sshd 1440 3 tcp4 192.168.13.24:22 192.168.13.253:4112 root sshd 1308 3 tcp4 192.168.13.24:22 192.168.13.253:51010 root sendmail 1211 3 tcp4 127.0.0.1:25 *:* root sshd 1203 4 tcp4 *:22 *:* root syslogd 909 7 udp4 *:514 *:* |
#sockstat -4
![]() USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root netcat 3546 0 tcp4 *:* *:* root netcat 3546 3 tcp4 *:3389 *:* root netcat 3511 3 tcp4 *:33383 *:* root sshd 1572 3 tcp4 192.168.13.24:22 192.168.13.253:4127 root sshd 1440 3 tcp4 192.168.13.24:22 192.168.13.253:4112 root sshd 1308 3 tcp4 192.168.13.24:22 192.168.13.253:51010 root sendmail 1211 3 tcp4 127.0.0.1:25 *:* root sshd 1203 4 tcp4 *:22 *:* root syslogd 909 7 udp4 *:514 *:* |
#sockstat -4
![]() USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root netcat 3546 0 tcp4 *:* *:* root netcat 3546 3 tcp4 *:3389 *:* root netcat 3511 3 tcp4 *:33383 *:* root sshd 1572 3 tcp4 192.168.13.24:22 192.168.13.253:4127 root sshd 1440 3 tcp4 192.168.13.24:22 192.168.13.253:4112 root sshd 1308 3 tcp4 192.168.13.24:22 192.168.13.253:51010 root sendmail 1211 3 tcp4 127.0.0.1:25 *:* root sshd 1203 4 tcp4 *:22 *:* root syslogd 909 7 udp4 *:514 *:* |
#sockstat -4
USER COMMAND PID FD PROTO LOCAL ADDRESS FOREIGN ADDRESS root netcat 3546 0 tcp4 *:* *:* root netcat 3546 3 tcp4 *:3389 *:* root netcat 3511 3 tcp4 *:33383 *:* root sshd 1572 3 tcp4 192.168.13.24:22 192.168.13.253:4127 root sshd 1440 3 tcp4 192.168.13.24:22 192.168.13.253:4112 root sshd 1308 3 tcp4 192.168.13.24:22 192.168.13.253:51010 root sendmail 1211 3 tcp4 127.0.0.1:25 *:* root sshd 1203 4 tcp4 *:22 *:* root syslogd 909 7 udp4 *:514 *:* |
#nm
![]() Makefile distinfo files/ pkg-descr |
#nmap
![]() bash: nmap: command not found |
#nm
![]() Makefile distinfo files/ pkg-descr |
#nmap
![]() bash: nmap: command not found |
#nm
![]() Makefile distinfo files/ pkg-descr |
#nmap
![]() bash: nmap: command not found |
#nm
![]() Makefile distinfo files/ pkg-descr |
#nmap
![]() bash: nmap: command not found |
#whereis nmpa
![]() nmpa: |
#whereis nmpa
![]() nmpa: |
#whereis nmpa
![]() nmpa: |
#whereis nmpa
nmpa: |
#whereis nmap
![]() nmap: /usr/ports/security/nmap |
#whereis nmap
![]() nmap: /usr/ports/security/nmap |
#whereis nmap
![]() nmap: /usr/ports/security/nmap |
#whereis nmap
nmap: /usr/ports/security/nmap |
#cd /usr/ports/security/nmap
![]() |
#cd /usr/ports/security/nmap
![]() |
#cd /usr/ports/security/nmap
![]() |
#cd /usr/ports/security/nmap
|
#make install clean
![]() ===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.50.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist//nmap-5.50.tar.bz2 nmap-5.50.tar.bz2 14% of 16 MB 237 kBps 00m56s^C fetch: transfer interrupted |
#make install clean
![]() ===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.50.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist//nmap-5.50.tar.bz2 nmap-5.50.tar.bz2 14% of 16 MB 237 kBps 00m56s^C fetch: transfer interrupted |
#make install clean
![]() ===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.50.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist//nmap-5.50.tar.bz2 nmap-5.50.tar.bz2 14% of 16 MB 237 kBps 00m56s^C fetch: transfer interrupted |
#make install clean
![]() ===> Vulnerability check disabled, database not found ===> License GPLv2 accepted by the user => nmap-5.50.tar.bz2 doesn't seem to exist in /usr/ports/distfiles/. => Attempting to fetch http://nmap.org/dist//nmap-5.50.tar.bz2 nmap-5.50.tar.bz2 14% of 16 MB 237 kBps 00m56s^C fetch: transfer interrupted |
#tcpdump 192.168.13.24
![]() tcpdump: syntax error |
#tcpdump 192.168.13.24
![]() tcpdump: syntax error |
#tcpdump 192.168.13.24
![]() tcpdump: syntax error |
#tcpdump 192.168.13.24
![]() tcpdump: syntax error |
#tcpdump 192.168.13.24
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:07.474651 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759813569, win 8326, options [nop,nop,TS val 3277077086 ecr 5376555], length 112 11:47:07.475616 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098552023 ecr 7972140], length 112 11:47:07.476264 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077086 ecr 5376570], length 112 11:47:07.477441 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552024 ecr 7972141], length 112 11:47:08.474783 IP freebsd4.net.nt.32445 > net.nt.domain: 35390+ PTR? 253.13.168.192.in-addr.arpa. (45) 11:47:08.476106 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077186 ecr 5376571], length 672 11:47:08.477353 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552124 ecr 7972141], length 640 11:47:09.467337 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077286 ecr 5377571], length 464 11:47:09.468602 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552223 ecr 7972241], length 432 11:47:10.471616 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077386 ecr 5378563], length 352 11:47:10.472596 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552323 ecr 7972340], length 336 11:47:11.467355 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077486 ecr 5379567], length 352 11:47:11.468286 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552423 ecr 7972441], length 336 ^C 13 packets captured 31 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:07.474651 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759813569, win 8326, options [nop,nop,TS val 3277077086 ecr 5376555], length 112 11:47:07.475616 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098552023 ecr 7972140], length 112 11:47:07.476264 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077086 ecr 5376570], length 112 11:47:07.477441 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552024 ecr 7972141], length 112 11:47:08.474783 IP freebsd4.net.nt.32445 > net.nt.domain: 35390+ PTR? 253.13.168.192.in-addr.arpa. (45) 11:47:08.476106 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077186 ecr 5376571], length 672 11:47:08.477353 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552124 ecr 7972141], length 640 11:47:09.467337 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077286 ecr 5377571], length 464 11:47:09.468602 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552223 ecr 7972241], length 432 11:47:10.471616 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077386 ecr 5378563], length 352 11:47:10.472596 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552323 ecr 7972340], length 336 11:47:11.467355 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077486 ecr 5379567], length 352 11:47:11.468286 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552423 ecr 7972441], length 336 ^C 13 packets captured 31 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:07.474651 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759813569, win 8326, options [nop,nop,TS val 3277077086 ecr 5376555], length 112 11:47:07.475616 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098552023 ecr 7972140], length 112 11:47:07.476264 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077086 ecr 5376570], length 112 11:47:07.477441 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552024 ecr 7972141], length 112 11:47:08.474783 IP freebsd4.net.nt.32445 > net.nt.domain: 35390+ PTR? 253.13.168.192.in-addr.arpa. (45) 11:47:08.476106 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077186 ecr 5376571], length 672 11:47:08.477353 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552124 ecr 7972141], length 640 11:47:09.467337 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077286 ecr 5377571], length 464 11:47:09.468602 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552223 ecr 7972241], length 432 11:47:10.471616 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077386 ecr 5378563], length 352 11:47:10.472596 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552323 ecr 7972340], length 336 11:47:11.467355 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077486 ecr 5379567], length 352 11:47:11.468286 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552423 ecr 7972441], length 336 ^C 13 packets captured 31 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:07.474651 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759813569, win 8326, options [nop,nop,TS val 3277077086 ecr 5376555], length 112 11:47:07.475616 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098552023 ecr 7972140], length 112 11:47:07.476264 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077086 ecr 5376570], length 112 11:47:07.477441 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552024 ecr 7972141], length 112 11:47:08.474783 IP freebsd4.net.nt.32445 > net.nt.domain: 35390+ PTR? 253.13.168.192.in-addr.arpa. (45) 11:47:08.476106 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077186 ecr 5376571], length 672 11:47:08.477353 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552124 ecr 7972141], length 640 11:47:09.467337 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077286 ecr 5377571], length 464 11:47:09.468602 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552223 ecr 7972241], length 432 11:47:10.471616 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077386 ecr 5378563], length 352 11:47:10.472596 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552323 ecr 7972340], length 336 11:47:11.467355 IP freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277077486 ecr 5379567], length 352 11:47:11.468286 IP freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098552423 ecr 7972441], length 336 ^C 13 packets captured 31 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -vv
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:22.422059 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 2759814481, win 8326, options [nop,nop,TS val 3277078581 ecr 5391502], length 112 11:47:22.423046 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098553518 ecr 7973634], length 112 11:47:22.423845 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277078581 ecr 5391517], length 112 11:47:22.424675 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098553518 ecr 7973636], length 112 ^C 4 packets captured 27 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:22.422059 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 2759814481, win 8326, options [nop,nop,TS val 3277078581 ecr 5391502], length 112 11:47:22.423046 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098553518 ecr 7973634], length 112 11:47:22.423845 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277078581 ecr 5391517], length 112 11:47:22.424675 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098553518 ecr 7973636], length 112 ^C 4 packets captured 27 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24
![]() tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:22.422059 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 2759814481, win 8326, options [nop,nop,TS val 3277078581 ecr 5391502], length 112 11:47:22.423046 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098553518 ecr 7973634], length 112 11:47:22.423845 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277078581 ecr 5391517], length 112 11:47:22.424675 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098553518 ecr 7973636], length 112 ^C 4 packets captured 27 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:22.422059 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 2759814481, win 8326, options [nop,nop,TS val 3277078581 ecr 5391502], length 112 11:47:22.423046 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098553518 ecr 7973634], length 112 11:47:22.423845 IP freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277078581 ecr 5391517], length 112 11:47:22.424675 IP freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098553518 ecr 7973636], length 112 ^C 4 packets captured 27 packets received by filter 0 packets dropped by kernel |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump src 192.168.13.24 -v
![]() tcpdump: syntax error |
#tcpdump -v src 192.168.13.24
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:34.766677 IP (tos 0x10, ttl 64, id 35198, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->14a0)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759816353, win 8326, options [nop,nop,TS val 3277079815 ecr 5403846], length 48 11:47:34.768293 IP (tos 0x10, ttl 64, id 35199, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->149f)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098554753 ecr 7974869], length 48 11:47:34.769423 IP (tos 0x10, ttl 64, id 35200, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145e)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277079816 ecr 5403862], length 112 11:47:34.770718 IP (tos 0x10, ttl 64, id 35201, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145d)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554753 ecr 7974870], length 112 11:47:35.770491 IP (tos 0x0, ttl 64, id 35202, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->54bc)!) ... 11:47:36.845346 IP (tos 0x10, ttl 64, id 35284, offset 0, flags [DF], proto TCP (6), length 212, bad cksum 0 (->13da)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 160 11:47:36.846042 IP (tos 0x10, ttl 64, id 35285, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c9)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277080023 ecr 5405940], length 176 11:47:36.846716 IP (tos 0x10, ttl 64, id 35286, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c8)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 176 ^C 89 packets captured 247 packets received by filter 0 packets dropped by kernel |
#tcpdump -v src 192.168.13.24
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:34.766677 IP (tos 0x10, ttl 64, id 35198, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->14a0)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759816353, win 8326, options [nop,nop,TS val 3277079815 ecr 5403846], length 48 11:47:34.768293 IP (tos 0x10, ttl 64, id 35199, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->149f)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098554753 ecr 7974869], length 48 11:47:34.769423 IP (tos 0x10, ttl 64, id 35200, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145e)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277079816 ecr 5403862], length 112 11:47:34.770718 IP (tos 0x10, ttl 64, id 35201, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145d)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554753 ecr 7974870], length 112 11:47:35.770491 IP (tos 0x0, ttl 64, id 35202, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->54bc)!) ... 11:47:36.845346 IP (tos 0x10, ttl 64, id 35284, offset 0, flags [DF], proto TCP (6), length 212, bad cksum 0 (->13da)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 160 11:47:36.846042 IP (tos 0x10, ttl 64, id 35285, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c9)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277080023 ecr 5405940], length 176 11:47:36.846716 IP (tos 0x10, ttl 64, id 35286, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c8)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 176 ^C 89 packets captured 247 packets received by filter 0 packets dropped by kernel |
#tcpdump -v src 192.168.13.24
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:34.766677 IP (tos 0x10, ttl 64, id 35198, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->14a0)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759816353, win 8326, options [nop,nop,TS val 3277079815 ecr 5403846], length 48 11:47:34.768293 IP (tos 0x10, ttl 64, id 35199, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->149f)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098554753 ecr 7974869], length 48 11:47:34.769423 IP (tos 0x10, ttl 64, id 35200, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145e)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277079816 ecr 5403862], length 112 11:47:34.770718 IP (tos 0x10, ttl 64, id 35201, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145d)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554753 ecr 7974870], length 112 11:47:35.770491 IP (tos 0x0, ttl 64, id 35202, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->54bc)!) ... 11:47:36.845346 IP (tos 0x10, ttl 64, id 35284, offset 0, flags [DF], proto TCP (6), length 212, bad cksum 0 (->13da)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 160 11:47:36.846042 IP (tos 0x10, ttl 64, id 35285, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c9)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277080023 ecr 5405940], length 176 11:47:36.846716 IP (tos 0x10, ttl 64, id 35286, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c8)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 176 ^C 89 packets captured 247 packets received by filter 0 packets dropped by kernel |
#tcpdump -v src 192.168.13.24
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:34.766677 IP (tos 0x10, ttl 64, id 35198, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->14a0)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 2759816353, win 8326, options [nop,nop,TS val 3277079815 ecr 5403846], length 48 11:47:34.768293 IP (tos 0x10, ttl 64, id 35199, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->149f)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1842079276, win 8326, options [nop,nop,TS val 3098554753 ecr 7974869], length 48 11:47:34.769423 IP (tos 0x10, ttl 64, id 35200, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145e)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277079816 ecr 5403862], length 112 11:47:34.770718 IP (tos 0x10, ttl 64, id 35201, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->145d)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554753 ecr 7974870], length 112 11:47:35.770491 IP (tos 0x0, ttl 64, id 35202, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->54bc)!) ... 11:47:36.845346 IP (tos 0x10, ttl 64, id 35284, offset 0, flags [DF], proto TCP (6), length 212, bad cksum 0 (->13da)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 160 11:47:36.846042 IP (tos 0x10, ttl 64, id 35285, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c9)!) freebsd4.net.nt.ssh > net.nt.51010: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3277080023 ecr 5405940], length 176 11:47:36.846716 IP (tos 0x10, ttl 64, id 35286, offset 0, flags [DF], proto TCP (6), length 228, bad cksum 0 (->13c8)!) freebsd4.net.nt.ssh > net.nt.4127: Flags [P.], ack 1, win 8326, options [nop,nop,TS val 3098554960 ecr 7975078], length 176 ^C 89 packets captured 247 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:41.244070 IP (tos 0x10, ttl 64, id 35371, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f3)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 98867108:98867156, ack 2759817409, win 8326, options [nop,nop,TS val 3277080463 ecr 5410322], length 48 11:47:41.244951 IP (tos 0x10, ttl 64, id 35372, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f2)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 1355665619:1355665667, ack 1842079324, win 8326, options [nop,nop,TS val 3098555400 ecr 7975516], length 48 11:47:41.245699 IP (tos 0x10, ttl 64, id 35373, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b1)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3277080463 ecr 5410339], length 112 11:47:41.246483 IP (tos 0x10, ttl 64, id 35374, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b0)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3098555400 ecr 7975518], length 112 11:47:42.242173 IP (tos 0x0, ttl 64, id 35375, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->540f)!) ... 11:47:58.370123 IP (tos 0x10, ttl 64, id 35570, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110c)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 56848:57440, ack 97, win 8326, options [nop,nop,TS val 3098557113 ecr 7977135], length 592 11:47:59.368606 IP (tos 0x10, ttl 64, id 35571, offset 0, flags [DF], proto TCP (6), length 676, bad cksum 0 (->10eb)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 61552:62176, ack 49, win 8326, options [nop,nop,TS val 3277082276 ecr 5427463], length 624 11:47:59.370535 IP (tos 0x10, ttl 64, id 35572, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110a)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 57440:58032, ack 97, win 8326, options [nop,nop,TS val 3098557213 ecr 7977231], length 592 ^C 202 packets captured 400 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:41.244070 IP (tos 0x10, ttl 64, id 35371, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f3)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 98867108:98867156, ack 2759817409, win 8326, options [nop,nop,TS val 3277080463 ecr 5410322], length 48 11:47:41.244951 IP (tos 0x10, ttl 64, id 35372, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f2)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 1355665619:1355665667, ack 1842079324, win 8326, options [nop,nop,TS val 3098555400 ecr 7975516], length 48 11:47:41.245699 IP (tos 0x10, ttl 64, id 35373, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b1)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3277080463 ecr 5410339], length 112 11:47:41.246483 IP (tos 0x10, ttl 64, id 35374, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b0)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3098555400 ecr 7975518], length 112 11:47:42.242173 IP (tos 0x0, ttl 64, id 35375, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->540f)!) ... 11:47:58.370123 IP (tos 0x10, ttl 64, id 35570, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110c)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 56848:57440, ack 97, win 8326, options [nop,nop,TS val 3098557113 ecr 7977135], length 592 11:47:59.368606 IP (tos 0x10, ttl 64, id 35571, offset 0, flags [DF], proto TCP (6), length 676, bad cksum 0 (->10eb)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 61552:62176, ack 49, win 8326, options [nop,nop,TS val 3277082276 ecr 5427463], length 624 11:47:59.370535 IP (tos 0x10, ttl 64, id 35572, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110a)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 57440:58032, ack 97, win 8326, options [nop,nop,TS val 3098557213 ecr 7977231], length 592 ^C 202 packets captured 400 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:41.244070 IP (tos 0x10, ttl 64, id 35371, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f3)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 98867108:98867156, ack 2759817409, win 8326, options [nop,nop,TS val 3277080463 ecr 5410322], length 48 11:47:41.244951 IP (tos 0x10, ttl 64, id 35372, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f2)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 1355665619:1355665667, ack 1842079324, win 8326, options [nop,nop,TS val 3098555400 ecr 7975516], length 48 11:47:41.245699 IP (tos 0x10, ttl 64, id 35373, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b1)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3277080463 ecr 5410339], length 112 11:47:41.246483 IP (tos 0x10, ttl 64, id 35374, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b0)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3098555400 ecr 7975518], length 112 11:47:42.242173 IP (tos 0x0, ttl 64, id 35375, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->540f)!) ... 11:47:58.370123 IP (tos 0x10, ttl 64, id 35570, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110c)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 56848:57440, ack 97, win 8326, options [nop,nop,TS val 3098557113 ecr 7977135], length 592 11:47:59.368606 IP (tos 0x10, ttl 64, id 35571, offset 0, flags [DF], proto TCP (6), length 676, bad cksum 0 (->10eb)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 61552:62176, ack 49, win 8326, options [nop,nop,TS val 3277082276 ecr 5427463], length 624 11:47:59.370535 IP (tos 0x10, ttl 64, id 35572, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110a)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 57440:58032, ack 97, win 8326, options [nop,nop,TS val 3098557213 ecr 7977231], length 592 ^C 202 packets captured 400 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes 11:47:41.244070 IP (tos 0x10, ttl 64, id 35371, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f3)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 98867108:98867156, ack 2759817409, win 8326, options [nop,nop,TS val 3277080463 ecr 5410322], length 48 11:47:41.244951 IP (tos 0x10, ttl 64, id 35372, offset 0, flags [DF], proto TCP (6), length 100, bad cksum 0 (->13f2)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 1355665619:1355665667, ack 1842079324, win 8326, options [nop,nop,TS val 3098555400 ecr 7975516], length 48 11:47:41.245699 IP (tos 0x10, ttl 64, id 35373, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b1)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3277080463 ecr 5410339], length 112 11:47:41.246483 IP (tos 0x10, ttl 64, id 35374, offset 0, flags [DF], proto TCP (6), length 164, bad cksum 0 (->13b0)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 48:160, ack 1, win 8326, options [nop,nop,TS val 3098555400 ecr 7975518], length 112 11:47:42.242173 IP (tos 0x0, ttl 64, id 35375, offset 0, flags [none], proto UDP (17), length 73, bad cksum 0 (->540f)!) ... 11:47:58.370123 IP (tos 0x10, ttl 64, id 35570, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110c)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 56848:57440, ack 97, win 8326, options [nop,nop,TS val 3098557113 ecr 7977135], length 592 11:47:59.368606 IP (tos 0x10, ttl 64, id 35571, offset 0, flags [DF], proto TCP (6), length 676, bad cksum 0 (->10eb)!) freebsd4.net.nt.ssh > fobos.net.nt.51010: Flags [P.], seq 61552:62176, ack 49, win 8326, options [nop,nop,TS val 3277082276 ecr 5427463], length 624 11:47:59.370535 IP (tos 0x10, ttl 64, id 35572, offset 0, flags [DF], proto TCP (6), length 644, bad cksum 0 (->110a)!) freebsd4.net.nt.ssh > fobos.net.nt.4127: Flags [P.], seq 57440:58032, ack 97, win 8326, options [nop,nop,TS val 3098557213 ecr 7977231], length 592 ^C 202 packets captured 400 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 25 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 25 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 25 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.24 and dst 192.168.13.21
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 25 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 15 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv dst 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 15 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv dst 192.168.13.21
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 15 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.21
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 13 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 15 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.21
![]() tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 15 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.21
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 15 packets received by filter 0 packets dropped by kernel |
#tcpdump -vv src 192.168.13.21 and dst 192.168.13.24
tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes ^C 0 packets captured 26 packets received by filter 0 packets dropped by kernel |
Время первой команды журнала | 10:38:22 2012- 4- 3 | |||||||||||||||||||||||||||
Время последней команды журнала | 10:50:01 2012- 4- 3 | |||||||||||||||||||||||||||
Количество командных строк в журнале | 101 | |||||||||||||||||||||||||||
Процент команд с ненулевым кодом завершения, % | 26.73 | |||||||||||||||||||||||||||
Процент синтаксически неверно набранных команд, % | 3.96 | |||||||||||||||||||||||||||
Суммарное время работы с терминалом *, час | 0.19 | |||||||||||||||||||||||||||
Количество командных строк в единицу времени, команда/мин | 8.67 | |||||||||||||||||||||||||||
Частота использования команд |
|
В журнал автоматически попадают все команды, данные в любом терминале системы.
Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.
Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
$ l s-l bash: l: command not found |
Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
$ test 5 -lt 4 |
Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
$ find / -name abc find: /home/devi-orig/.gnome2: Keine Berechtigung find: /home/devi-orig/.gnome2_private: Keine Berechtigung find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung find: /home/devi-orig/.metacity: Keine Berechtigung find: /home/devi-orig/.inkscape: Keine Berechtigung ^C |
Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
# id uid=0(root) gid=0(root) Gruppen=0(root) |
Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
$ vi ~/.bashrc
|
Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
$ patch ~/.bashrc |
Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.
Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.
Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.
Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора
Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.
Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.
Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:
$ whoami
user
$ #^ Интересно, кто я?в журнале это будет выглядеть так:
$ whoami
user
Интересно, кто я? |
Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:
$ whoami
user
$ cat > /dev/null #^ Интересно, кто я?
Программа whoami выводит имя пользователя, под которым мы зарегистрировались в системе. - Она не может ответить на вопрос о нашем назначении в этом мире.В журнале это будет выглядеть так:
$ whoami user
|
Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=
1 2 3 4Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.
LiLaLo (L3) расшифровывается как Live Lab Log.
Программа разработана для повышения эффективности обучения Unix/Linux-системам.
(c) Игорь Чубин, 2004-2008