Журнал лабораторных работ

Содержание

Журнал

Вторник (06/02/09)

/dev/pts/22
10:33:22
#10:33:23.333479 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:33:23.607176 IP 10.0.40.21.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:23.777068 ARP, Request who-has 10.0.1.5 (Broadcast) tell 10.0.1.5, length 46
10:33:23.779110 ARP, Request who-has 10.0.13.2 (Broadcast) tell 10.0.13.2, length 46
10:33:24
#10:33:24.183339 ARP, Request who-has 10.0.1.1 tell 10.0.40.21, length 46
10:33:24.333108 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:33:24.354713 IP 10.0.40.21.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:24.638802 IP 10.0.20.1.59331 > 255.255.255.255.1211: UDP, length 75
10:33:24.724267 ARP, Request who-has 10.0.51.1 tell 10.0.1.25, length 46
10:33:24.746634 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:33:25.105413 IP 10.0.40.21.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:25.333168 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:33:25.694844 IP 10.0.100.33.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:1b:9e:83:68:5e (oui Unknown), length 300
10:33:25.697299 IP 10.0.1.7.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length 300
10:33:25.700909 IP6 fe80::14ea:1c2e:316d:46bf.63586 > ff02::c.3702: UDP, length 1026
10:33:25.752581 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:33:25.758776 IP6 fe80::50ad:2824:ffe6:7bdc.62889 > ff02::c.3702: UDP, length 1026
10:33:25.758881 IP 10.0.35.100.32769 > 10.0.35.1.domain: 64484+[|domain]
10:33:25.759130 IP 10.0.35.1.domain > 10.0.35.100.32769: 64484 NXDomain*[|domain]
10:33:25.772366 IP6 fe80::14ea:1c2e:316d:46bf.63586 > ff02::c.3702: UDP, length 1026
10:33:25.777796 ARP, Request who-has 10.0.1.5 (Broadcast) tell 10.0.1.5, length 46
10:33:25.779005 ARP, Request who-has 10.0.13.2 (Broadcast) tell 10.0.13.2, length 46
10:33:25.815354 IP6 fe80::50ad:2824:ffe6:7bdc.62889 > ff02::c.3702: UDP, length 1026
10:33:26
#10:33:26.858960 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:33:27.059836 IP6 fe80::14ea:1c2e:316d:46bf.546 > ff02::1:2.547: dhcp6 solicit
10:33:27.777838 ARP, Request who-has 10.0.1.5 (Broadcast) tell 10.0.1.5, length 46
10:33:27.778902 ARP, Request who-has 10.0.13.2 (Broadcast) tell 10.0.13.2, length 46
10:33:28.464913 IP 10.0.40.116.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:28.640530 IP 192.168.14.1.netbios-dgm > 192.168.14.255.netbios-dgm: NBT UDP PACKET(138)
10:33:28.640666 IP 10.0.35.100.32769 > 10.0.35.1.domain: 32587+ PTR? 255.14.168.192.in-addr.arpa. (45)
10:33:28.695109 IP 10.0.100.33.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 00:1b:9e:83:68:5e (oui Unknown), length 300
10:33:28.696326 IP 10.0.1.7.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length 300
10:33:28.699911 IP 10.0.35.1.domain > 10.0.35.100.32769: 32587 NXDomain 0/1/0 (122)
10:33:28.706915 IP 10.0.100.33.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
...
        0x0010:  0000 0000 0105 0000 0000 0000 7400 6f00  ............t.o.
        0x0020:  7000 6100 7a00 2e00 7400 6500 6300 6800  p.a.z...t.e.c.h.
        0x0030:  2e00 6900 6e00 6300 0000 0000            ..i.n.c.....
10:33:29.456096 IP 10.0.100.33.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:29.566466 ARP, Request who-has 10.0.14.50 tell 10.0.1.120, length 46
10:33:29.776467 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:33:29.776568 ARP, Request who-has 10.0.1.5 (Broadcast) tell 10.0.1.5, length 46
10:33:29.779933 ARP, Request who-has 10.0.13.2 (Broadcast) tell 10.0.13.2, length 46
10:33:29.944281 IP 10.0.40.116.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:30.003016 ARP, Request who-has 10.0.1.124 tell 10.0.1.120, length 46
10:33:30
#10:33:30.018613 ARP, Request who-has 10.0.1.120 tell 10.0.1.124, length 46
10:33:30.033999 ARP, Request who-has 192.168.14.1 tell 192.168.14.7, length 46
10:33:30.034363 ARP, Request who-has 192.168.14.7 tell 192.168.14.1, length 46
10:33:30.091217 IP 192.168.105.2.36358 > 10.0.35.100.9999: Flags [S], seq 3070528114, win 5840, options [mss 1460,sackOK,TS val 465882 ecr 0,nop,wscale 6], length 0
10:33:30.091235 IP 10.0.35.100.9999 > 192.168.105.2.36358: Flags [S.], seq 2025527372, ack 3070528115, win 5792, options [mss 1460,sackOK,TS val 17402235 ecr 465882,nop,wscale 4], length 0
10:33:30.092233 IP 192.168.105.2.36358 > 10.0.35.100.9999: Flags [.], ack 1, win 92, options [nop,nop,TS val 465882 ecr 17402235], length 0
10:33:30.093362 IP 192.168.105.2.36358 > 10.0.35.100.9999: Flags [P.], seq 1:265, ack 1, win 92, options [nop,nop,TS val 465882 ecr 17402235], length 264
10:33:30.093368 IP 10.0.35.100.9999 > 192.168.105.2.36358: Flags [.], ack 265, win 429, options [nop,nop,TS val 17402235 ecr 465882], length 0
10:33:30.105411 IP 10.0.35.100.38546 > 10.0.35.1.9999: Flags [S], seq 2028139423, win 5840, options [mss 1460,sackOK,TS val 17402239 ecr 0,nop,wscale 4], length 0
10:33:30.105517 IP 10.0.35.1.9999 > 10.0.35.100.38546: Flags [S.], seq 4061438496, ack 2028139424, win 5792, options [mss 1460,sackOK,TS val 410134797 ecr 17402239,nop,wscale 4], length 0
10:33:30.105527 IP 10.0.35.100.38546 > 10.0.35.1.9999: Flags [.], ack 1, win 365, options [nop,nop,TS val 17402239 ecr 410134797], length 0
...
10:33:30.333027 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [S], seq 3077844109, win 5840, options [mss 1460,sackOK,TS val 465942 ecr 0,nop,wscale 6], length 0
10:33:30.333035 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [S.], seq 2027690652, ack 3077844110, win 5792, options [mss 1460,sackOK,TS val 17402296 ecr 465942,nop,wscale 4], length 0
10:33:30.333992 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 1, win 92, options [nop,nop,TS val 465942 ecr 17402296], length 0
10:33:30.334226 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [P.], seq 1:232, ack 1, win 92, options [nop,nop,TS val 465943 ecr 17402296], length 231
10:33:30.334230 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], ack 232, win 429, options [nop,nop,TS val 17402296 ecr 465943], length 0
10:33:30.362069 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [S], seq 2031840393, win 5840, options [mss 1460,sackOK,TS val 17402301 ecr 0,nop,wscale 4], length 0
10:33:30.362153 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [S.], seq 4076464478, ack 2031840394, win 5792, options [mss 1460,sackOK,TS val 410134861 ecr 17402301,nop,wscale 4], length 0
10:33:30.362168 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 1, win 365, options [nop,nop,TS val 17402301 ecr 410134861], length 0
10:33:30.362329 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [P.], seq 1:231, ack 1, win 365, options [nop,nop,TS val 17402301 ecr 410134861], length 230
10:33:30.362416 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], ack 231, win 429, options [nop,nop,TS val 410134861 ecr 17402301], length 0
10:33:30
#10:33:30.630126 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 1:18, ack 231, win 429, options [nop,nop,TS val 410134926 ecr 17402301], length 17
10:33:30.630134 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 18, win 365, options [nop,nop,TS val 17402370 ecr 410134926], length 0
10:33:30.630157 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 18:2914, ack 231, win 429, options [nop,nop,TS val 410134926 ecr 17402301], length 2896
10:33:30.630159 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 2914, win 546, options [nop,nop,TS val 17402370 ecr 410134926], length 0
10:33:30.630217 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 2914:4286, ack 231, win 429, options [nop,nop,TS val 410134926 ecr 17402370], length 1372
10:33:30.630221 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 4286, win 727, options [nop,nop,TS val 17402370 ecr 410134926], length 0
10:33:30.659739 IP 10.0.50.1.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:30.669013 ARP, Request who-has 10.0.50.1 tell 10.0.1.4, length 46
10:33:30.681234 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 4286:7182, ack 231, win 429, options [nop,nop,TS val 410134939 ecr 17402370], length 2896
10:33:30.681237 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 7182, win 908, options [nop,nop,TS val 17402383 ecr 410134939], length 0
10:33:30.681244 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 7182:8382, ack 231, win 429, options [nop,nop,TS val 410134939 ecr 17402370], length 1200
...
10:33:30.756983 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 16572, win 635, options [nop,nop,TS val 466048 ecr 17402401], length 0
10:33:30.803322 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 20670:23566, ack 231, win 429, options [nop,nop,TS val 410134971 ecr 17402401], length 2896
10:33:30.803326 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 23566, win 2356, options [nop,nop,TS val 17402413 ecr 410134971], length 0
10:33:30.803333 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 23566:24766, ack 231, win 429, options [nop,nop,TS val 410134971 ecr 17402401], length 1200
10:33:30.803335 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 24766, win 2537, options [nop,nop,TS val 17402413 ecr 410134971], length 0
10:33:30.803539 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 16572:19468, ack 232, win 429, options [nop,nop,TS val 17402413 ecr 466048], length 2896
10:33:30.803544 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 19468:20668, ack 232, win 429, options [nop,nop,TS val 17402413 ecr 466048], length 1200
10:33:30.804969 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 18020, win 680, options [nop,nop,TS val 466060 ecr 17402413], length 0
10:33:30.804974 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 19468, win 725, options [nop,nop,TS val 466060 ecr 17402413], length 0
10:33:30.804975 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 20668, win 770, options [nop,nop,TS val 466060 ecr 17402413], length 0
10:33:30
#10:33:30.832047 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 24766:27662, ack 231, win 429, options [nop,nop,TS val 410134977 ecr 17402413], length 2896
10:33:30.832053 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 27662, win 2718, options [nop,nop,TS val 17402420 ecr 410134977], length 0
10:33:30.832059 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 27662:28862, ack 231, win 429, options [nop,nop,TS val 410134977 ecr 17402413], length 1200
10:33:30.832062 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 28862, win 2899, options [nop,nop,TS val 17402420 ecr 410134977], length 0
10:33:30.832257 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 20668:23564, ack 232, win 429, options [nop,nop,TS val 17402420 ecr 466060], length 2896
10:33:30.832261 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 23564:24764, ack 232, win 429, options [nop,nop,TS val 17402420 ecr 466060], length 1200
10:33:30.833702 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 22116, win 816, options [nop,nop,TS val 466067 ecr 17402420], length 0
10:33:30.833707 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 23564, win 861, options [nop,nop,TS val 466067 ecr 17402420], length 0
10:33:30.833712 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 24764, win 906, options [nop,nop,TS val 466067 ecr 17402420], length 0
10:33:30.869112 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 28862:31758, ack 231, win 429, options [nop,nop,TS val 410134985 ecr 17402420], length 2896
10:33:30.869115 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 31758, win 3080, options [nop,nop,TS val 17402430 ecr 410134985], length 0
...
10:33:31.051490 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 61630, win 3879, options [nop,nop,TS val 17402475 ecr 410135033], length 0
10:33:31.051656 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 53436:56332, ack 232, win 429, options [nop,nop,TS val 17402475 ecr 466119], length 2896
10:33:31.051660 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 56332:57532, ack 232, win 429, options [nop,nop,TS val 17402475 ecr 466119], length 1200
10:33:31.053122 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 57532, win 1002, options [nop,nop,TS val 466122 ecr 17402475], length 0
10:33:31.098756 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 61630:64526, ack 231, win 429, options [nop,nop,TS val 410135045 ecr 17402475], length 2896
10:33:31.098766 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 64526:65726, ack 231, win 429, options [nop,nop,TS val 410135045 ecr 17402475], length 1200
10:33:31.098771 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 65726, win 3879, options [nop,nop,TS val 17402487 ecr 410135045], length 0
10:33:31.098962 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 57532:60428, ack 232, win 429, options [nop,nop,TS val 17402487 ecr 466122], length 2896
10:33:31.098966 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 60428:61628, ack 232, win 429, options [nop,nop,TS val 17402487 ecr 466122], length 1200
10:33:31.100428 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 61628, win 1002, options [nop,nop,TS val 466134 ecr 17402487], length 0
10:33:31
#10:33:31.107051 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 65726:68622, ack 231, win 429, options [nop,nop,TS val 410135045 ecr 17402487], length 2896
10:33:31.107055 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 68622:69822, ack 231, win 429, options [nop,nop,TS val 410135045 ecr 17402487], length 1200
10:33:31.107058 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 69822, win 3879, options [nop,nop,TS val 17402489 ecr 410135045], length 0
10:33:31.107195 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 61628:64524, ack 232, win 429, options [nop,nop,TS val 17402489 ecr 466134], length 2896
10:33:31.107200 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 64524:65724, ack 232, win 429, options [nop,nop,TS val 17402489 ecr 466134], length 1200
10:33:31.108656 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 65724, win 1002, options [nop,nop,TS val 466136 ecr 17402489], length 0
10:33:31.113953 ARP, Request who-has 10.0.14.50 tell 10.0.1.120, length 46
10:33:31.122141 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 69822:72718, ack 231, win 429, options [nop,nop,TS val 410135049 ecr 17402489], length 2896
10:33:31.122159 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 72718:73918, ack 231, win 429, options [nop,nop,TS val 410135049 ecr 17402489], length 1200
10:33:31.122162 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 73918, win 3879, options [nop,nop,TS val 17402493 ecr 410135049], length 0
10:33:31.122558 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 65724:68620, ack 232, win 429, options [nop,nop,TS val 17402493 ecr 466136], length 2896
...
10:33:31.412879 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 118974, win 3879, options [nop,nop,TS val 17402565 ecr 410135123], length 0
10:33:31.413016 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 110780:113676, ack 232, win 429, options [nop,nop,TS val 17402565 ecr 466202], length 2896
10:33:31.413025 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 113676:114876, ack 232, win 429, options [nop,nop,TS val 17402565 ecr 466202], length 1200
10:33:31.414507 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 114876, win 1002, options [nop,nop,TS val 466213 ecr 17402565], length 0
10:33:31.430407 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 118974:121870, ack 231, win 429, options [nop,nop,TS val 410135128 ecr 17402565], length 2896
10:33:31.430416 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 121870:123070, ack 231, win 429, options [nop,nop,TS val 410135128 ecr 17402565], length 1200
10:33:31.430426 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 123070, win 3879, options [nop,nop,TS val 17402570 ecr 410135128], length 0
10:33:31.430605 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 114876:117772, ack 232, win 429, options [nop,nop,TS val 17402570 ecr 466213], length 2896
10:33:31.430615 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 117772:118972, ack 232, win 429, options [nop,nop,TS val 17402570 ecr 466213], length 1200
10:33:31.432079 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 118972, win 1002, options [nop,nop,TS val 466217 ecr 17402570], length 0
10:33:31
#10:33:31.446512 IP 10.0.40.116.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:31.479246 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 123070:125966, ack 231, win 429, options [nop,nop,TS val 410135140 ecr 17402570], length 2896
10:33:31.479256 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 125966:127166, ack 231, win 429, options [nop,nop,TS val 410135140 ecr 17402570], length 1200
10:33:31.479260 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 127166, win 3879, options [nop,nop,TS val 17402582 ecr 410135140], length 0
10:33:31.479435 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 118972:121868, ack 232, win 429, options [nop,nop,TS val 17402582 ecr 466217], length 2896
10:33:31.479445 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 121868:123068, ack 232, win 429, options [nop,nop,TS val 17402582 ecr 466217], length 1200
10:33:31.480943 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 123068, win 1002, options [nop,nop,TS val 466229 ecr 17402582], length 0
10:33:31.482291 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 127166:130062, ack 231, win 429, options [nop,nop,TS val 410135140 ecr 17402582], length 2896
10:33:31.482333 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 130062:131262, ack 231, win 429, options [nop,nop,TS val 410135140 ecr 17402582], length 1200
10:33:31.482337 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 131262, win 3879, options [nop,nop,TS val 17402582 ecr 410135140], length 0
10:33:31.482482 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 123068:125964, ack 232, win 429, options [nop,nop,TS val 17402582 ecr 466229], length 2896
...
10:33:31.859873 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 196796:199692, ack 232, win 429, options [nop,nop,TS val 17402677 ecr 466316], length 2896
10:33:31.859878 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 199692:200892, ack 232, win 429, options [nop,nop,TS val 17402677 ecr 466316], length 1200
10:33:31.861435 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 200892, win 1002, options [nop,nop,TS val 466324 ecr 17402677], length 0
10:33:31.873134 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 204990:207886, ack 231, win 429, options [nop,nop,TS val 410135238 ecr 17402677], length 2896
10:33:31.873142 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 207886:209086, ack 231, win 429, options [nop,nop,TS val 410135238 ecr 17402677], length 1200
10:33:31.873147 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 209086, win 3879, options [nop,nop,TS val 17402681 ecr 410135238], length 0
10:33:31.873313 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 200892:203788, ack 232, win 429, options [nop,nop,TS val 17402681 ecr 466324], length 2896
10:33:31.873317 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 203788:204988, ack 232, win 429, options [nop,nop,TS val 17402681 ecr 466324], length 1200
10:33:31.874791 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 204988, win 1002, options [nop,nop,TS val 466328 ecr 17402681], length 0
10:33:31.889767 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:33:31
#10:33:31.916456 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 209086:211982, ack 231, win 429, options [nop,nop,TS val 410135248 ecr 17402681], length 2896
10:33:32.477160 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 323774, win 3879, options [nop,nop,TS val 17402832 ecr 410135389], length 0
10:33:32.477349 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 315580:318476, ack 232, win 429, options [nop,nop,TS val 17402832 ecr 466468], length 2896
10:33:32.477356 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 318476:319676, ack 232, win 429, options [nop,nop,TS val 17402832 ecr 466468], length 1200
10:33:32.478814 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 319676, win 1002, options [nop,nop,TS val 466479 ecr 17402832], length 0
10:33:32.522340 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [.], seq 323774:326670, ack 231, win 429, options [nop,nop,TS val 410135401 ecr 17402832], length 2896
10:33:32.522345 IP 10.0.35.1.9999 > 10.0.35.100.38547: Flags [P.], seq 326670:327870, ack 231, win 429, options [nop,nop,TS val 410135401 ecr 17402832], length 1200
10:33:32.522349 IP 10.0.35.100.38547 > 10.0.35.1.9999: Flags [.], ack 327870, win 3879, options [nop,nop,TS val 17402842 ecr 410135401], length 0
10:33:32.522495 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [.], seq 319676:322572, ack 232, win 429, options [nop,nop,TS val 17402842 ecr 466479], length 2896
10:33:32.522500 IP 10.0.35.100.9999 > 192.168.105.2.36359: Flags [P.], seq 322572:323772, ack 232, win 429, options [nop,nop,TS val 17402842 ecr 466479], length 1200
10:33:32.523959 IP 192.168.105.2.36359 > 10.0.35.100.9999: Flags [.], ack 323772, win 1002, options [nop,nop,TS val 466490 ecr 17402842], length 0
...
10:33:32.815895 IP 10.0.35.1.9999 > 10.0.35.100.38548: Flags [.], ack 260, win 429, options [nop,nop,TS val 410135474 ecr 17402915], length 0
10:33:33.054109 IP 10.0.35.1.9999 > 10.0.35.100.38548: Flags [P.], seq 1:28, ack 260, win 429, options [nop,nop,TS val 410135533 ecr 17402915], length 27
10:33:33.054114 IP 10.0.35.100.38548 > 10.0.35.1.9999: Flags [.], ack 28, win 365, options [nop,nop,TS val 17402976 ecr 410135533], length 0
10:33:33.054165 IP 10.0.35.1.9999 > 10.0.35.100.38548: Flags [P.], seq 28:123, ack 260, win 429, options [nop,nop,TS val 410135533 ecr 17402976], length 95
10:33:33.054168 IP 10.0.35.100.38548 > 10.0.35.1.9999: Flags [.], ack 123, win 365, options [nop,nop,TS val 17402976 ecr 410135533], length 0
10:33:33.054211 IP 10.0.35.100.38548 > 10.0.35.1.9999: Flags [F.], seq 260, ack 123, win 365, options [nop,nop,TS val 17402976 ecr 410135533], length 0
10:33:33.054304 IP 10.0.35.1.9999 > 10.0.35.100.38548: Flags [F.], seq 123, ack 261, win 429, options [nop,nop,TS val 410135533 ecr 17402976], length 0
10:33:33.054308 IP 10.0.35.100.38548 > 10.0.35.1.9999: Flags [.], ack 124, win 365, options [nop,nop,TS val 17402976 ecr 410135533], length 0
10:33:33.054979 IP 10.0.35.100.9999 > 192.168.105.2.36360: Flags [P.], seq 1:28, ack 261, win 429, options [nop,nop,TS val 17402976 ecr 466560], length 27
10:33:33.056227 IP 192.168.105.2.36360 > 10.0.35.100.9999: Flags [.], ack 28, win 92, options [nop,nop,TS val 466623 ecr 17402976], length 0
10:33:44
#10:33:44.334563 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:33:44.524992 IP 10.0.12.1 > 239.255.255.250: igmp v2 report 239.255.255.250
10:33:44.642358 IP 10.0.20.1.59331 > 255.255.255.255.1211: UDP, length 75
10:33:44.865679 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:33:44.945768 IP 10.0.1.7.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:44.988607 IP 10.0.40.116.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:44
#10:33:45.334624 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:33:45.695833 IP 10.0.1.7.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:33:45
#10:33:45.777125 ARP, Request who-has 10.0.1.5 (Broadcast) tell 10.0.1.5, length 46
10:34:19.775683 ARP, Request who-has 10.0.1.5 (Broadcast) tell 10.0.1.5, length 46
10:34:19.776411 ARP, Request who-has 10.0.13.2 (Broadcast) tell 10.0.13.2, length 46
10:34:19.833206 IP 10.0.40.116.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:34:20.029021 ARP, Request who-has 192.168.14.10 tell 192.168.14.1, length 46
10:34:20.051326 IP 10.0.47.1.1165 > 255.255.255.255.1211: UDP, length 75
10:34:20.175602 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:34:20.189082 IP 10.0.1.2.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:34:20.294792 ARP, Request who-has 10.0.19.1 tell 10.0.1.25, length 46
10:34:20.302125 IP 10.0.1.3.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:34:20.583556 IP 10.0.40.116.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
...
10:34:33.076055 IP 10.0.35.100.ssh > linux13.unix.nt.54565: Flags [P.], seq 2860:2908, ack 2468, win 956, options [nop,nop,TS val 17417980 ecr 4294908186], length 48
10:34:33.076226 IP linux13.unix.nt.54565 > 10.0.35.100.ssh: Flags [.], ack 2908, win 214, options [nop,nop,TS val 4294908186 ecr 17417980], length 0
10:34:33.338640 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:34:33.353248 IP linux13.unix.nt.54565 > 10.0.35.100.ssh: Flags [P.], seq 2468:2516, ack 2908, win 214, options [nop,nop,TS val 4294908255 ecr 17417980], length 48
10:34:33.353454 IP 10.0.35.100.ssh > linux13.unix.nt.54565: Flags [P.], seq 2908:2956, ack 2516, win 956, options [nop,nop,TS val 17418050 ecr 4294908255], length 48
10:34:33.353706 IP linux13.unix.nt.54565 > 10.0.35.100.ssh: Flags [.], ack 2956, win 214, options [nop,nop,TS val 4294908256 ecr 17418050], length 0
10:34:33.437021 IP linux13.unix.nt.54565 > 10.0.35.100.ssh: Flags [P.], seq 2516:2564, ack 2956, win 214, options [nop,nop,TS val 4294908276 ecr 17418050], length 48
10:34:33.437243 IP 10.0.35.100.ssh > linux13.unix.nt.54565: Flags [P.], seq 2956:3004, ack 2564, win 956, options [nop,nop,TS val 17418071 ecr 4294908276], length 48
10:34:33.437434 IP linux13.unix.nt.54565 > 10.0.35.100.ssh: Flags [.], ack 3004, win 214, options [nop,nop,TS val 4294908276 ecr 17418071], length 0
10:34:33.531129 ARP, Request who-has 192.168.14.253 tell 192.168.14.1, length 46
/dev/pts/10
10:34:30
#screen -x
/dev/pts/24
10:35:14
#apt-get install ethtool
Чтение списков пакетов... Готово
Построение дерева зависимостей
Чтение информации о состоянии... Готово
Уже установлена самая новая версия ethtool.
обновлено 0, установлено 0 новых пакетов, для удаления отмечено 0 пакетов, и 25 пакетов не обновлено.
10:35:17
#ethtool
ethtool: bad command line argument(s)
For more information run ethtool -h
10:35:21
#ethtool -h
ethtool version 6git
Usage:
ethtool DEVNAME Display standard information about device
        ethtool -s|--change DEVNAME     Change generic options
                [ speed %%d ]
                [ duplex half|full ]
                [ port tp|aui|bnc|mii|fibre ]
                [ autoneg on|off ]
                [ advertise %%x ]
                [ phyad %%d ]
...
        ethtool -p|--identify DEVNAME   Show visible port identification (e.g. blinking)
               [ TIME-IN-SECONDS ]
        ethtool -t|--test DEVNAME       Execute adapter self test
               [ online | offline ]
        ethtool -S|--statistics DEVNAME Show adapter statistics
        ethtool -n|--show-nfc DEVNAME   Show Rx network flow classificationoptions
                [ rx-flow-hash tcp4|udp4|ah4|sctp4|tcp6|udp6|ah6|sctp6 ]
        ethtool -N|--config-nfc DEVNAME Configure Rx network flow classification options
                [ rx-flow-hash tcp4|udp4|ah4|sctp4|tcp6|udp6|ah6|sctp6 p|m|v|t|s|d|f|n|r... ]
        ethtool -h|--help DEVNAME       Show this help
10:35:23
#ethtool -h | less
/dev/pts/0
10:36:02
#ssh 192.168.15.254
  25    100/1000T | No        Yes     Up     10HDx      MDIX  off   0
  26    100/1000T | No        Yes     Down   1000FDx    MDIX  off   0
  27    100/1000T | No        Yes     Up     1000FDx    MDIX  off   0
  28    100/1000T | No        Yes     Down   1000FDx    MDIX  off   0
  29    100/1000T | No        Yes     Up     1000FDx    MDI   off   0
  30    100/1000T | No        Yes     Down   1000FDx    MDI   off   0
  31    100/1000T | No        Yes     Up     1000FDx    MDIX  off   0
  32    100/1000T | No        Yes     Down   1000FDx    MDIX  off   0
  33    100/1000T | No        Yes     Down   1000FDx    MDI   off   0
  34    100/1000T | No        Yes     Down   1000FDx    MDIX  off   0
  35    100/1000T | No        Yes     Down   1000FDx    MDI   off   0
/dev/pts/22
10:40:42
#10:40:43.049578 IP 10.0.66.1.netbios-dgm > 10.255.255.255.netbios-dgm: NBT UDP PACKET(138)
10:40:43.341825 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:40:43.366089 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:40:43.417650 IP 10.0.1.3.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:40:43.576245 IP 10.0.1.2.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
10:40:43
#10:40:43.752613 ARP, Request who-has 10.0.1.5 (Broadcast) tell 10.0.1.5, length 46
10:40:43.757802 ARP, Request who-has 10.0.13.2 (Broadcast) tell 10.0.13.2, length 46
10:40:44
#10:40:44.167705 IP 10.0.1.3.netbios-ns > 10.255.255.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST

10:40:44
#10:40:44.365718 ARP, Request who-has 10.0.10.223 tell 10.0.10.222, length 46
10:40:44.518508 ARP, Request who-has 10.0.20.201 tell 10.0.1.7, length 46
10:40:44
#10:40:44.657736 IP 10.0.20.1.59331 > 255.255.255.255.1211: UDP, length 75
10:40:53.317209 IP 192.168.105.2.39155 > 10.0.35.100.ssh: Flags [.], ack 450048, win 1002, options [nop,nop,TS val 576687 ecr 17513034], length 0
10:40:53.317212 IP linux9.unix.nt.58891 > 10.0.35.100.ssh: Flags [.], ack 450176, win 1002, options [nop,nop,TS val 755460 ecr 17513034], length 0
10:40:53.317218 IP 10.0.35.100.ssh > linux15.unix.nt.58191: Flags [P.], seq 450016:450144, ack 145, win 857, options [nop,nop,TS val 17513034 ecr 1004954], length 128
10:40:53.317223 IP linux11.unix.nt.51451 > 10.0.35.100.ssh: Flags [.], ack 450144, win 1002, options [nop,nop,TS val 18036775 ecr 17513034], length 0
10:40:53.317248 IP 10.0.35.100.ssh > 192.168.108.2.60432: Flags [P.], seq 498848:498976, ack 3201, win 857, options [nop,nop,TS val 17513034 ecr 1003539], length 128
10:40:53.317277 IP 10.0.35.100.ssh > 192.168.15.253.43536: Flags [P.], seq 456540:456668, ack 30209, win 956, options [nop,nop,TS val 17513034 ecr 23408378], length 128
10:40:53.317300 IP 10.0.35.100.ssh > 192.168.104.8.39490: Flags [P.], seq 382097:382225, ack 2704, win 857, options [nop,nop,TS val 17513034 ecr 836508], length 128
10:40:53.317320 IP linux3.unix.nt.33397 > 10.0.35.100.ssh: Flags [.], ack 448416, win 1002, options [nop,nop,TS val 472172 ecr 17513034], length 0
10:40:53.317334 IP 10.0.35.100.ssh > linux13.unix.nt.54565: Flags [P.], seq 319916:320060, ack 3284, win 956, options [nop,nop,TS val 17513034 ecr 35947], length 144
10:40:53.317398 IP 192.168.102.2.50364 > 10.0.35.100.ssh: Flags [.], ack 455440, win 1002, options [nop,nop,TS val 309491 ecr 17513034], length 0
...
10:40:54.965640 IP 10.0.35.100.49903 > 192.168.15.254.ssh: Flags [.], ack 1133529, win 11819, options [nop,nop,TS val 17513445 ecr 125915], length 0
10:40:54.965981 IP 10.0.35.100.ssh > linux6.unix.nt.48936: Flags [P.], seq 482384:482432, ack 2625, win 857, options [nop,nop,TS val 17513445 ecr 22454462], length 48
10:40:54.966049 IP 10.0.35.100.ssh > linux9.unix.nt.58891: Flags [P.], seq 450448:450496, ack 145, win 857, options [nop,nop,TS val 17513445 ecr 755837], length 48
10:40:54.966089 IP 10.0.35.100.ssh > 192.168.106.2.56161: Flags [P.], seq 450448:450496, ack 145, win 857, options [nop,nop,TS val 17513447 ecr 723002], length 48
10:40:54.966116 IP 10.0.35.100.ssh > linux11.unix.nt.51451: Flags [P.], seq 450416:450464, ack 145, win 857, options [nop,nop,TS val 17513447 ecr 18037153], length 48
10:40:54.966132 IP linux6.unix.nt.48936 > 10.0.35.100.ssh: Flags [.], ack 482432, win 1002, options [nop,nop,TS val 22454463 ecr 17513445], length 0
10:40:54.966154 IP 10.0.35.100.ssh > 192.168.102.2.50364: Flags [P.], seq 455712:455760, ack 401, win 857, options [nop,nop,TS val 17513447 ecr 309869], length 48
10:40:54.966183 IP 10.0.35.100.ssh > linux3.unix.nt.33397: Flags [P.], seq 448688:448736, ack 145, win 857, options [nop,nop,TS val 17513447 ecr 472550], length 48
10:40:54.966195 IP linux9.unix.nt.58891 > 10.0.35.100.ssh: Flags [.], ack 450496, win 1002, options [nop,nop,TS val 755872 ecr 17513445], length 0
10:40:54.966222 IP 10.0.35.100.ssh > 192.168.105.2.39155: Flags [P.], seq 450448:450496, ack 145, win 857, options [nop,nop,TS val 17513447 ecr 577065], length 48
/dev/pts/24
10:41:23
#apt-cache search mii-diag
mii-diag - A little tool to manipulate network cards
10:41:29
#lspci

10:44:24
#ssh 192.168.15.1
root@192.168.15.1's password:
Linux linux1 2.6.29-2-686 #1 SMP Sun May 17 17:56:29 UTC 2009 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Tue Jun  2 10:16:48 2009 from 192.168.101.2
l3-agent is already running: pid=4334; pidfile=/root/.lilalo/l3-agent.pid
/dev/pts/22
10:44:55
#pgrep tcpdump

10:45:06
#ps -aux|grep tcpdump
Warning: bad ps syntax, perhaps a bogus '-'? See http://procps.sf.net/faq.html
root     11513  0.0  0.2   4924   768 pts/23   R+   10:45   0:00 grep tcpdump
10:45:24
#screen -x
прошло 12 минут
/dev/pts/32
10:57:44
#screen -x
/dev/pts/24
10:59:17
#caÐеÐt /proc/sys/net/i