tcpdump 分析 IPv6 包

tcpdump icmp6 -XX

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
21:35:46.919301 IP6 240e:3b7: > guangzhou-xx-xx-xx-247: ICMP6, echo request, seq 5412, length 16
0x0000: 5254 005f 7111 feee 8510 4bc5 86dd 6689 RT._q…..K…f.
0x0010: 0400 0010 3a34 240e 0000 0000 0000 0000 ….:4$…2$n.-.
0x0020: e431 a261 4cd2 2402 4e00 1013 e500 0000 .1.aL.$.N…….
0x0030: 940c 7377 7cbc 8000 5f66 e880 1524 61bf ..sw|…_f…$a.
0x0040: 3532 000c d76c 52…l

tcpdump ip6 proto 6

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
21:35:57.681602 IP6 beijing-xx-xx-xx-5.55998 > 2402:4e00:40:40::2:331.https: Flags [P.], seq 3521054660:3521054788, ack 3373296701, win 73, length 128
21:35:57.715035 IP6 2402:4e00:40:40::2:331.https > beijing-xx-xx-xx-5.55998: Flags [.], ack 128, win 64, length 0
21:35:57.718536 IP6 2402:4e00:40:40::2:331.https > beijing-xx-xx-xx-5.55998: Flags [P.], seq 1:616, ack 128, win 64, length 615
21:35:57.718553 IP6 beijing-xx-xx-xx-5.55998 > 2402:4e00:40:40::2:331.https: Flags [.], ack 616, win 79, length 0
21:35:59.079661 IP6 beijing-xx-xx-xx-5.55998 > 2402:4e00:40:40::2:331.https: Flags [P.], seq 128:166, ack 616, win 79, length 38

原创文章,作者:陌涛,如若转载,请注明出处:https://imotao.com/6823.html

(0)
陌涛的头像陌涛
上一篇 2022年11月2日
下一篇 2022年11月4日

相关推荐

发表回复

您的电子邮箱地址不会被公开。 必填项已用 * 标注

此站点使用Akismet来减少垃圾评论。了解我们如何处理您的评论数据