edzero3
(usa Debian)
Enviado em 08/04/2014 - 16:05h
Mas neste caso o ip do cara esta passando por fora.
usei o tcpdump, em um servidor aqui e o ip dele é 192.168.1.4, ficando assim.:
tcpdump -ni any host 192.168.1.4
Como decifrar este resultado, saber o que o cara acessou:
16:00:59.180279 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 220224:220676, ack 817, win 624, length 452
16:00:59.180382 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 220676:220840, ack 817, win 624, length 164
16:00:59.180479 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 220840:221004, ack 817, win 624, length 164
16:00:59.180576 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 221004:221168, ack 817, win 624, length 164
16:00:59.180682 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 221168:221332, ack 817, win 624, length 164
16:00:59.180780 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 221332:221496, ack 817, win 624, length 164
16:00:59.182523 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 211888, win 441, length 0
16:00:59.182548 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 221496:221660, ack 817, win 624, length 164
16:00:59.182576 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 212432, win 439, length 0
16:00:59.182622 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 212856, win 437, length 0
16:00:59.182692 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 221660:221920, ack 817, win 624, length 260
16:00:59.182812 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 221920:222164, ack 817, win 624, length 244
16:00:59.182934 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 222164:222440, ack 817, win 624, length 276
16:00:59.183036 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 222440:222604, ack 817, win 624, length 164
16:00:59.183133 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 222604:222768, ack 817, win 624, length 164
16:00:59.183306 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 213168, win 436, length 0
16:00:59.183328 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 222768:222932, ack 817, win 624, length 164
16:00:59.183356 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 213660, win 434, length 0
16:00:59.183419 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 222932:223080, ack 817, win 624, length 148
16:00:59.183540 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 223080:223340, ack 817, win 624, length 260
16:00:59.183660 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 223340:223616, ack 817, win 624, length 276
16:00:59.184633 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 214068, win 432, length 0
16:00:59.184664 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 223616:223780, ack 817, win 624, length 164
16:00:59.184742 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 223780:223928, ack 817, win 624, length 148
16:00:59.220695 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 214508, win 430, length 0
16:00:59.220718 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 223928:224256, ack 817, win 624, length 328
16:00:59.220806 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 224256:224404, ack 817, win 624, length 148
16:00:59.272405 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 214836, win 429, length 0
16:00:59.272426 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 224404:224732, ack 817, win 624, length 328
16:00:59.272512 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 224732:224880, ack 817, win 624, length 148
16:00:59.340649 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 215260, win 428, length 0
16:00:59.340671 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 224880:225208, ack 817, win 624, length 328
16:00:59.340757 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 225208:225356, ack 817, win 624, length 148
16:00:59.340855 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 225356:225520, ack 817, win 624, length 164
16:00:59.374163 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [.], ack 215572, win 426, length 0
16:00:59.374188 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 225520:225848, ack 817, win 624, length 328
16:00:59.374325 IP 192.168.1.1.22 > 192.168.1.4.52053: Flags [P.], seq 225848:225996, ack 817, win 624, length 148
16:00:59.388758 IP 192.168.1.4.52053 > 192.168.1.1.22: Flags [P.], seq 817:869, ack 215572, win 426, length 52