日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 运维知识 > linux >内容正文

linux

总结:抓包命令之linux抓包命令

發布時間:2023/12/31 linux 28 豆豆
生活随笔 收集整理的這篇文章主要介紹了 总结:抓包命令之linux抓包命令 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

一、介紹

linux抓包命令

二、被請求端口監聽:dst port

tcpflow -ci eth0 dst port 6060

tcpdump -i eth0 dst port 6060

案例:

hubble-transfer服務端口為9511,所以下面截圖的案例其實就是監聽服務開啟的端口,有哪些請求來源數據。

三、請求端口監聽:src

tcpflow -ci eth0 src port 9092:監聽來源端口為9092的網絡包數據。說白了,是請求端口為9092的服務的數據。

案例:

以下案例是Kafka消費者,Kafka的端口為9092,hubble-biz-log從9092端口消費數據(其實本質就是請求9092端口服務)

代碼:

/*** 監聽流水日志* @param message*/@KafkaListener(topics = "hubble-log-ms")public void consumer(String message,Acknowledgment ack){try {Map<String,Object> dataMap = JSON.parseObject(message, new TypeReference<Map<String,Object>>(){}.getType());HubbleSyslogMsVO hubbleSyslogMsVO = handleToVO(dataMap);if(!hubbleSyslogMsVO.getRequesturi().contains("query")){logList.add(hubbleSyslogMsVO);if (logList.size() >= batchSize) {int num = hubbleSyslogMsVOMapper.insertBatch(logList);log.info("log batch num={}",num);logList.clear();}}} catch (Exception e) {logList.clear();log.error("consumer has error,error info is ",e);}finally {ack.acknowledge();}}

抓包日志:

[root@hubble-biz-log-pod-64b7b45596-q2dz2 DockerHubblebizhost]# tcpflow -ci eth0 src port 9092 tcpflow: listening on eth0 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: stat_syslog_access_line 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: D{eyF.{"requestUri":"/api/host/hostSync","haoshi":0} 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.188.09092-010.068.202.022.56576: 6' 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.188.09092-010.068.202.022.56576: stat_syslog_access_line 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.188.09092-010.068.202.022.56576: JkatyF4{"requestUri":"/api/group/queryGrpInfo","haoshi":59} 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.168.09092-010.068.202.022.50760: +,stat_syslog_access_line 010.034.004.168.09092-010.068.202.022.50760: +.stat_syslog_access_line 010.034.004.182.09092-010.068.202.022.58066: M+ 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: stat_syslog_access_line 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: QODyF;{"requestUri":"/api/template/findStrategyById","haoshi":18} 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.168.09092-010.068.202.022.50760: +0stat_syslog_access_line 010.034.004.182.09092-010.068.202.022.58066: / 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: stat_syslog_access_line 010.034.004.182.09092-010.068.202.022.58066: x 010.034.004.182.09092-010.068.202.022.58066: J=xyG4{"requestUri":"/api/open/notice/v2/send","haoshi":1} 010.034.004.182.09092-010.068.202.022.58066: = 010.034.004.168.09092-010.068.202.022.50760: +2stat_syslog_access_line 010.034.004.188.09092-010.068.202.022.56576: 6- 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.188.09092-010.068.202.022.56576: stat_syslog_access_line 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.188.09092-010.068.202.022.56576: JOyG@4{"requestUri":"/api/group/queryGrpInfo","haoshi":38} 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.168.09092-010.068.202.022.50760: +4stat_syslog_access_line 010.034.004.188.09092-010.068.202.022.56576: 3 010.034.004.188.09092-010.068.202.022.56572: 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.188.09092-010.068.202.022.56572: 010.034.004.188.09092-010.068.202.022.56576: stat_syslog_access_line hubble-log-ms88.09092-010.068.202.022.56572: 010.034.004.188.09092-010.068.202.022.56572: N 010.034.004.188.09092-010.068.202.022.56576: x 010.034.004.188.09092-010.068.202.022.56576: J~PyGZ4{"requestUri":"/api/open/notice/v2/send","haoshi":0} 010.034.004.188.09092-010.068.202.022.56572: NyGZ{"responsecode":200,"enddate":1656556701530,"clientIp":"10.19.0.227","paramData":"{\"noticeWay\": \"\", \"content\": \"QAE \\u62a5\\u8b66\\uff1a\\u5e94\\u7528wangcan.itv-tab-drama-ulike-deep-scorer-v1-prod-wh.bdwh-online01 (docker-registry.qiyi.virtual/mba-rec/mba-deep-rank-service:prod-gl_scorer-2112171043)\\u5728\\u8fc7\\u53bb60\\u5206\\u949f\\u5931\\u8d25\\u4e8634\\u6b21\\uff0c\\u8bf7\\u53ca\\u65f6\\u5173\\u6ce8\\u5904\\u7406\\u3002\", \"toUsers\": \"wangcan\", \"emailSubject\": \"QAE \\u62a5\\u8b66\"}","methodName":"POST","usertoken":"5fa50","startdate":1656556701530,"total_time":0,"uri":"/api/open/notice/v2/send","username":"guoguanglu"} 010.034.004.188.09092-010.068.202.022.56576: = 010.034.004.168.09092-010.068.202.022.50836: 4IY 010.034.004.168.09092-010.068.202.022.50836: 010.034.004.168.09092-010.068.202.022.50836: hubble-log-event 010.034.004.168.09092-010.068.202.022.50836: B7 010.034.004.188.09092-010.068.202.022.56572: = 010.034.004.168.09092-010.068.202.022.50760: +6stat_syslog_access_line hubble-log-ms68.09092-010.068.202.022.50758: ! 010.034.004.168.09092-010.068.202.022.50756: $I\hubble-log-event 010.034.004.168.09092-010.068.202.022.50836: I] 010.034.004.168.09092-010.068.202.022.50836: 010.034.004.168.09092-010.068.202.022.50836: hubble-log-event 010.034.004.168.09092-010.068.202.022.50836: B8 010.034.004.168.09092-010.068.202.022.50836: B7}&yG]{"responsecode":404,"enddate":1656556701533,"clientIp":"10.128.220.10","paramData":"{}","methodName":"HEAD","startdate":1656556701532,"total_time":1,"uri":"/error"}= 010.034.004.188.09092-010.068.202.022.56576: M5 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.188.09092-010.068.202.022.56576: stat_syslog_access_line 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.188.09092-010.068.202.022.56576: QBoVyGg;{"requestUri":"/api/template/findStrategyById","haoshi":22} 010.034.004.188.09092-010.068.202.022.56576: 010.034.004.182.09092-010.068.202.022.58066: 61 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: stat_syslog_access_line 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.182.09092-010.068.202.022.58066: JqyGr4{"requestUri":"/api/group/queryGrpInfo","haoshi":37} 010.034.004.182.09092-010.068.202.022.58066: 010.034.004.168.09092-010.068.202.022.50760: +8stat_syslog_access_line 010.034.004.168.09092-010.068.202.022.50760: +:stat_syslog_access_line 010.034.004.198.09092-010.068.202.022.55068: ) 010.034.004.198.09092-010.068.202.022.55068: 010.034.004.198.09092-010.068.202.022.55068: stat_syslog_access_line 010.034.004.198.09092-010.068.202.022.55068: x 010.034.004.198.09092-010.068.202.022.55068: JwVyG4{"requestUri":"/api/open/notice/v2/send","haoshi":0} 010.034.004.198.09092-010.068.202.022.55068: = 010.034.004.168.09092-010.068.202.022.50760: +<stat_syslog_access_line 010.034.004.188.09092-010.068.202.022.56572: M 010.034.004.188.09092-010.068.202.022.56572: hubble-log-ms88.09092-010.068.202.022.56572: 010.034.004.188.09092-010.068.202.022.56572: N 010.034.004.188.09092-010.068.202.022.56572: NRyG{"responsecode":200,"enddate":1656556701596,"clientIp":"10.19.0.228","paramData":"{\"noticeWay\": \"\", \"content\": \"QAE \\u62a5\\u8b66\\uff1a\\u5e94\\u7528wangcan.itv-tab-drama-ulike-deep-scorer-v1-prod-wh.bdwh-online01 (docker-registry.qiyi.virtual/mba-rec/mba-deep-rank-service:prod-gl_scorer-2112171043)\\u5bb9\\u5668\\u5b9e\\u4f8b\\u4e0d\\u7a33\\u5b9a\\uff0c\\u5728\\u8fc7\\u53bb6\\u5c0f\\u65f6\\u5185\\u81f3\\u5c11\\u53d8\\u66f4\\u4e8635\\u6b21\\uff0c\\u8bf7\\u53ca\\u65f6\\u5173\\u6ce8\\u5904\\u7406\\u3002\", \"toUsers\": \"wangcan\", \"emailSubject\": \"QAE \\u62a5\\u8b66\"}","methodName":"POST","usertoken":"5fa50","startdate":1656556701596,"total_time":0,"uri":"/api/open/notice/v2/send","username":"guoguanglu"}

四、其它使用示例

  • 1. 針對特定網口抓包 ( -i 選項?)
    ? ? ? ? 不加任何選項執行 tcpdump 時,tcpdump 將抓取通過所有網口的包;使用 -i 在指定的網口抓包:
    ? ? ? ? 示例:tcpdump 抓取所有通過 eth0 的包。命令:root@kali:~# tcpdump -i eth0
  • 2. 抓取指定數目的包( -c 選項 )。
    ? ? ? ??默認情況下 tcpdump 將一直抓包,直到按下 Ctrl + c?中止,使用 -c 選項我們可以指定抓包的數量:
    ? ? ? ??示例:只針對 eth0 網口抓 10?個包。命令:root@kali:~# tcpdump -i eth0 -c 10
  • 3. 將抓到包寫入文件中( -w 選項 )使用 -w 選項,將抓包記錄到一個指定文件中,保存為.pcap后綴的文件,可以使用 wireshark 等工具讀取分析。
    ? ? ? ??命令:root@kali:~# tcpdump -i eth0 -c 10 -w 2017.pcap? ? ??
  • 4. 讀取 tcpdump 保存文件( -r 選項 )。對于保存的抓包文件,我們可以使用 -r 選項進行讀取。命令:root@kali:~# tcpdump -r 2017.pcap
  • 5. 抓包時不進行域名解析( -n選項 )。默認情況下,tcpdump 抓包結果中將進行域名解析,顯示的是域名地址而非 ip 地址,使用 -n 選項,可指定顯示 ip 地址。
  • 6. 增加抓包時間戳(-tttt選項)。使用-tttt選項,抓包結果中將包含抓包日期:
  • 7. 指定抓包的協議類型。我們可以只抓某種協議的包,tcpdump 支持指定以下協議:ip、ip6、arp、tcp、udp、wlan 等。
    ? ? ? ? 示例:只抓取 arp 協議的包:root@kali:~# tcpdump -i eth0 -tttt arp
  • 8. 指定抓包端口。如果想要對某個特定的端口抓包,可以通過以下命令:root@kali:~# tcpdump -i eth0 port 22
  • 9. 抓取特定目標 ip和端口 的包。網絡包的內容中,包含了源ip地址、端口和目標ip、端口,我們可以根據目標ip和端口過濾tcpdump抓包結果,以下命令說明了此用法:
    ????????示例:root@kali:~# tcpdump -i eth0 dst 10.70.121.92 and port 22
    ????????示例:root@kali:~# tcpdump -i eth0 -c 10 ip -tttt -X

參考文檔:

https://blog.csdn.net/weixin_34124651/article/details/88267519

總結

以上是生活随笔為你收集整理的总结:抓包命令之linux抓包命令的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。