[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 dst host 192.168.0.106
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
01:10:03.673075 IP (tos 0x0, ttl 64, id 16278, offset 0, flags [DF], proto TCP (6), length 40)
192.168.0.105.61237 > 192.168.0.106.22: Flags [.], cksum 0x5346 (correct), ack 1305983704, win 2052, length 0
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 src host 192.168.0.106
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
01:10:41.765360 IP (tos 0x10, ttl 64, id 6206, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.61237: Flags [P.], cksum 0x82c2 (incorrect -> 0xa560), seq 1305986852:1305986984, ack 4200326642, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ip host 192.168.0.106
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
01:12:59.059575 IP (tos 0x10, ttl 64, id 6388, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.61237: Flags [P.], cksum 0x82c2 (incorrect -> 0x952b), seq 1306004764:1306004896, ack 4200335222, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ether dst 00-0c-29-d2-ca-67
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
01:16:42.894832 IP (tos 0x0, ttl 64, id 16841, offset 0, flags [DF], proto TCP (6), length 40)
192.168.0.105.61237 > 192.168.0.106.22: Flags [.], cksum 0x793b (correct), ack 1306020008, win 2050, length 0
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ether src 00-0c-29-d2-ca-67
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
01:17:37.039629 IP (tos 0x10, ttl 64, id 6633, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.61237: Flags [P.], cksum 0x82c2 (incorrect -> 0x0542), seq 1306024544:1306024676, ack 4200347146, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ether host 00-0c-29-d2-ca-67
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
11:46:19.555566 IP (tos 0x10, ttl 64, id 61184, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0xde1e), seq 2182248108:2182248240, ack 2364553553, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump 'gateway snup' tcpdump: 'gateway' not supported in this configuration
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 dst net 192.168.0.0/24
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:06:19.030478 IP (tos 0x10, ttl 64, id 61901, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0x2add), seq 2182311952:2182312084, ack 2364588497, win 255, length 132
1 packet captured
2 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 src net 192.168.0.0/24
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:06:48.825334 IP (tos 0x10, ttl 64, id 61933, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0xe4d7), seq 2182315264:2182315396, ack 2364590005, win 255, length 132
1 packet captured
2 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 net 192.168.0.0/24
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:07:08.922141 IP (tos 0x10, ttl 64, id 61962, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0xef18), seq 2182318420:2182318552, ack 2364591357, win 255, length 132
1 packet captured
2 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 net 192.168.0.0 mask 255.255.255.0
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:07:46.647637 IP (tos 0x10, ttl 64, id 61991, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0xdaa9), seq 2182320424:2182320556, ack 2364592709, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 net 192.168.0.0/24
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:08:28.222361 IP (tos 0x10, ttl 64, id 62018, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0x50a1), seq 2182322340:2182322472, ack 2364593957, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 dst port 22
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:11:27.522941 IP (tos 0x0, ttl 64, id 21657, offset 0, flags [DF], proto TCP (6), length 40)
192.168.0.105.54999 > 192.168.0.106.22: Flags [.], cksum 0xb18d (correct), ack 2182327416, win 2051, length 0
1 packet captured
1 packet received by filter
0 packets dropped by kernel
/etc/services
中定义的。[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 dst port ssh
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:14:04.677979 IP (tos 0x0, ttl 64, id 21982, offset 0, flags [DF], proto TCP (6), length 40)
192.168.0.105.54999 > 192.168.0.106.22: Flags [.], cksum 0x2da6 (correct), ack 2182748884, win 2048, length 0
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 tcp src port ssh
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:17:38.405954 IP (tos 0x10, ttl 64, id 62633, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0x5f85), seq 2182764324:2182764456, ack 2364608829, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 src port ssh
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:16:35.726544 IP (tos 0x10, ttl 64, id 62576, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0xc094), seq 2182757760:2182757892, ack 2364606489, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 tcp port ssh tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:18:03.275948 IP (tos 0x10, ttl 64, id 62654, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0xb8d0), seq 2182766648:2182766780, ack 2364609765, win 255, length 132
1 packet captured
2 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 less 500 and greater 100
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:18:56.467847 IP (tos 0x10, ttl 64, id 62711, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0xafe7), seq 2182771020:2182771152, ack 2364612261, win 255, length 132
1 packet captured
2 packets received by filter
0 packets dropped by kernel
首选需要知道的基础概念,协议标题链:在IP标题和TCP标题之间,信息包还可能包含多个标题如:认证标题、路由标题或逐跳点选项标题。
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ip proto 1 tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes 12:23:29.608377 IP (tos 0x0, ttl 64, id 22435, offset 0, flags [none], proto ICMP (1), length 60) 192.168.0.105 > 192.168.0.106: ICMP echo request, id 1, seq 3, length 40 1 packet captured 2 packets received by filter 0 packets dropped by kernel [root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ip proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:57:41.167112 IP (tos 0x0, ttl 64, id 25398, offset 0, flags [DF], proto TCP (6), length 40)
192.168.0.105.54999 > 192.168.0.106.22: Flags [.], cksum 0xe89d (correct), ack 2182804312, win 2047, length 0
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ether proto '\ip'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:56:56.635569 IP (tos 0x10, ttl 64, id 63076, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.54999: Flags [P.], cksum 0x82c2 (incorrect -> 0x9cb0), seq 2182799952:2182800084, ack 2364628289, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ether broadcast
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:27:09.277758 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 150)
192.168.0.1.54215 > 255.255.255.255.5001: UDP, length 122
1 packet captured
2 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ip broadcast tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:26:49.117544 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 150)
192.168.0.1.54215 > 255.255.255.255.5001: UDP, length 122
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ether multicast
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:47:46.844738 IP (tos 0x0, ttl 4, id 8781, offset 0, flags [none], proto UDP (17), length 165)
192.168.0.105.50199 > 239.255.255.250.1900: UDP, length 137
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ip multicast tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:48:54.939269 IP (tos 0x0, ttl 4, id 8787, offset 0, flags [none], proto UDP (17), length 165)
192.168.0.105.50199 > 239.255.255.250.1900: UDP, length 137
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ip6 multicast
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:51:09.986178 IP6 (flowlabel 0xdba91, hlim 1, next-header UDP (17) payload length: 31) fe80::1cd5:52f7:7452:3394.59253 > ff02::1:3.5355: [udp sum ok] UDP, length 23
1 packet captured
2 packets received by filter
0 packets dropped by kernel
ip src host 192.168.0.106
src ip proto '\tcp'
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -A host www.baidu.com tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes 14:37:40.529809 IP (tos 0x0, ttl 64, id 22417, offset 0, flags [DF], proto TCP (6), length 60) 172.16.230.77.50264 > 14.215.177.39.80: Flags [S], cksum 0x528b (incorrect -> 0x4599), seq 273784045, win 29200, options [mss 1460,sackOK,TS val 9882492 ecr 0,nop,wscale 7], length 0 E...X.P.Q........r.R..........
...|........
14:37:40.583775 IP (tos 0x0, ttl 55, id 22417, offset 0, flags [DF], proto TCP (6), length 60)
14.215.177.39.80 > 172.16.230.77.50264: Flags [S.], cksum 0xc516 (correct), seq 3549089316, ack 273784046, win 8192, options [mss 1440,sackOK,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,wscale 5], length 0
E..<[email protected]......'...M.P.X...$.Q.... ......................... 14:37:40.583831 IP (tos 0x0, ttl 64, id 22418, offset 0, flags [DF], proto TCP (6), length 40) 172.16.230.77.50264 > 14.215.177.39.80: Flags [.], cksum 0x5277 (incorrect -> 0x48fa), ack 1, win 229, length 0 E..(W.@[email protected]...'.X.P.Q.....%P...Rw..
14:37:40.583980 IP (tos 0x0, ttl 64, id 22419, offset 0, flags [DF], proto TCP (6), length 184)
172.16.230.77.50264 > 14.215.177.39.80: Flags [P.], cksum 0x5307 (incorrect -> 0x206e), seq 1:145, ack 1, win 229, length 144: HTTP, length: 144
GET / HTTP/1.1
Host: www.baidu.com
Connection: keep-alive
Accept-Encoding: gzip, deflate
Accept: */*
User-Agent: python-requests/2.21.0
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -D
1.bluetooth0 (Bluetooth adapter number 0)
2.nflog (Linux netfilter log (NFLOG) interface)
3.nfqueue (Linux netfilter queue (NFQUEUE) interface)
4.usbmon1 (USB bus number 1)
5.usbmon2 (USB bus number 2)
6.ens33
7.ens37
8.any (Pseudo-device that captures on all interfaces)
9.lo [Loopback]
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 10 -q
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
14:45:28.741311 IP (tos 0x10, ttl 64, id 49128, offset 0, flags [DF], proto TCP (6), length 172)
[root@Tyson'sComputer learntcpdump]# tcpdump -i ens33 -vnn -c 5 -q -w test_01.pcap tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes 5 packets captured 5 packets received by filter 0 packets dropped by kernel [root@Tyson'sComputer learntcpdump]# tcpdump -i ens33 -vnn -c 5 -q -r test_01.pcap
reading from file test_01.pcap, link-type EN10MB (Ethernet)
14:47:14.927658 IP (tos 0x10, ttl 64, id 49303, offset 0, flags [DF], proto TCP (6), length 172)
172.16.230.77.22 > 172.16.230.33.61528: tcp 132
14:47:14.927881 IP (tos 0x0, ttl 64, id 18549, offset 0, flags [DF], proto TCP (6), length 40)
172.16.230.33.61528 > 172.16.230.77.22: tcp 0
14:47:15.223367 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 172.16.230.1 tell 172.16.230.77, length 28
14:47:15.224989 ARP, Ethernet (len 6), IPv4 (len 4), Reply 172.16.230.1 is-at 00:12:7f:04:33:46, length 46
14:47:15.930304 IP (tos 0x10, ttl 64, id 49304, offset 0, flags [DF], proto TCP (6), length 92)
172.16.230.77.22 > 172.16.230.33.61528: tcp 52
[root@Tyson'sComputer learntcpdump]# tcpdump -i ens33 -vnn -c 1 ip proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
14:52:03.246984 IP (tos 0x10, ttl 64, id 49572, offset 0, flags [DF], proto TCP (6), length 172)
172.16.230.77.22 > 172.16.230.33.61528: Flags [P.], cksum 0x252f (incorrect -> 0x2f51), seq 1610077566:1610077698, ack 4005464801, win 281, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer learntcpdump]# tcpdump -i ens33 -vnn -c 5 -s 8 proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 8 bytes
14:55:35.111005 [|ether]
14:55:35.111355 [|ether]
14:55:35.111542 [|ether]
14:55:35.111693 [|ether]
14:55:35.111733 [|ether]
5 packets captured
8 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -t -vnn -c 1 ip proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
IP (tos 0x10, ttl 64, id 38602, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.52440: Flags [P.], cksum 0x82c2 (incorrect -> 0xe571), seq 1860148461:1860148593, ack 3132104578, win 255, length 132
1 packet captured
2 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -tt -vnn -c 1 ip proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
1550314546.539873 IP (tos 0x10, ttl 64, id 38636, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.52440: Flags [P.], cksum 0x82c2 (incorrect -> 0x57d7), seq 1860150693:1860150825, ack 3132106190, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -ttt -vnn -c 1 ip proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
00:00:00.000000 IP (tos 0x10, ttl 64, id 38668, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.52440: Flags [P.], cksum 0x82c2 (incorrect -> 0xb799), seq 1860152837:1860152969, ack 3132107698, win 255, length 132
1 packet captured
2 packets received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vnn -c 1 ip proto '\tcp' tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes 19:01:02.113400 IP (tos 0x10, ttl 64, id 38866, offset 0, flags [DF], proto TCP (6), length 172) 192.168.0.106.22 > 192.168.0.105.52440: Flags [P.], cksum 0x82c2 (incorrect -> 0x8ba4), seq 1860167677:1860167809, ack 3132116970, win 255, length 132 1 packet captured 2 packets received by filter 0 packets dropped by kernel [root@Tyson'sComputer ~]# tcpdump -i ens33 -vvnn -c 1 ip proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
19:01:05.694262 IP (tos 0x0, ttl 64, id 28280, offset 0, flags [DF], proto TCP (6), length 40)
192.168.0.105.52440 > 192.168.0.106.22: Flags [.], cksum 0xe8d9 (correct), seq 3132118322, ack 1860170017, win 2052, length 0
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -vvvnn -c 1 ip proto '\tcp'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
19:01:08.591836 IP (tos 0x10, ttl 64, id 38925, offset 0, flags [DF], proto TCP (6), length 172)
192.168.0.106.22 > 192.168.0.105.52440: Flags [P.], cksum 0x82c2 (incorrect -> 0xa920), seq 1860172393:1860172525, ack 3132119778, win 255, length 132
1 packet captured
1 packet received by filter
0 packets dropped by kernel
Use spi@ipaddr algo:secret for decrypting IPsec ESP
packets that are addressed to addr and contain
Security Parameter Index value spi. This combina‐
tion may be repeated with comma or newline separa‐
tion.
原语总结
- 类型:host、net、port、ip >proto、protochain等
- 传输方向:src、dst、dst or >src、dst and src等
- 协议:ip、arp、rarp、tcp、udp>、icmp、http等
- 单位原语格式
- 协议 + [传输方向] + 类型 + >具体数值
- eg:
ip src host 192.168.0.106
- eg:
src ip proto '\tcp'
tcpdump -i ens33 -vnn host 10.10.10.122
tcpdump -i ens33 -vnn net 10.10.10.0/24
tcpdump -i ens33 -vnn net 10.10.10.0 mask 255.255.255.0
tcpdump -i ens33 -vnn port 22
tcpdump -i ens33 -vnn udp
tcpdump -i ens33 -vnn icmp
tcpdump -i ens33 -vnn arp
tcpdump -i ens33 -vnn ip proto ip
tcpdump -i ens33 -vnn ip
tcpdump -i ens33 -vnn src host 10.10.10.122
tcpdump -i ens33 -vnn dst host 10.10.10.122
tcpdump -i ens33 -vnn src port 22
tcpdump -i ens33 -vnn src host 10.10.10.122 and dst port 22
tcpdump -i ens33 -vnn src host 10.10.10.122 or port 22
tcpdump -i ens33 -vnn src host 10.10.10.122 and not port 22
tcpdump -i ens33 -vnn \(src host 10.10.10.2 and port 22 \) or \(src ip host 10.10.10.65 and prot 80\)
tcpdump -i ens33 -vnn '\(src host 10.10.10.59 and dst port 22\) 'or '\(src host 10.10.10.68 and dst prot 80\)'
tcpdump -i ens33 -c 100 -w /tmp/fill
tcpdump -i ens33 -r /tmp/fill tcp
tcpdump -i ens33 -r /tmp/fill host 10.10.10.58
tcpdump -i ens33 ether multicast and not port 22 and 'not icmp'
tcpdump -i ens33 -n ip and dst prot 22
tcpdump -i ens33 ether src host 00:0c:29:2f:a7:50 and arp
tcpdump -i ens33 ip proto ospf
proto
或者ip proto
加上在/etc/protocols
中能够找到的协议或者相应的协议编号进行过滤。tcpdump -i ens33 greater 200
tcpdump tcp
tcpdump proto[字节偏移:字节长度]
,tcpdump -i ens33 -c 1 -vnn ip[9]=6
,这里指定的是ip包头第十个字节(协议值)为6(TCP协议)。tcpdump -i ens33 -c 1 ip multicast and ip broadcast
tcpdump -i ens33 -c 1 -vnn 'ether[0] & 1 != 0'
[root@Tyson'sComputer ~]# tcpdump -i ens33 -c 1 -vnn 'ether[0] & 1 != 0'
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
20:06:24.474565 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 150)
192.168.0.1.54215 > 255.255.255.255.5001: UDP, length 122
1 packet captured
1 packet received by filter
0 packets dropped by kernel
[root@Tyson'sComputer ~]# tcpdump -i ens33 -c 1 -vnn 'tcp[0:2] & 0xffff > 0x0017 '
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
20:13:28.120060 IP (tos 0x0, ttl 64, id 29264, offset 0, flags [DF], proto TCP (6), length 40)
192.168.0.105.52440 > 192.168.0.106.22: Flags [.], cksum 0xd64f (correct), ack 1860219453, win 2049, length 0
1 packet captured
1 packet received by filter
0 packets dropped by kernel