WBlog

wangzhiwei blog

0%

抓9000 端口 上的请求

192.168.40.116 机器上

ip a

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:0c:29:94:5c:7f brd ff:ff:ff:ff:ff:ff
inet 192.168.40.116/24 brd 192.168.40.255 scope global noprefixroute ens192
valid_lft forever preferred_lft forever
inet 172.17.10.10/24 scope global ens192
valid_lft forever preferred_lft forever
inet6 2408:8606:8400:30a:6::41/128 scope global noprefixroute dynamic
valid_lft 6018sec preferred_lft 5718sec
inet6 fe80::d6f6:f5f6:1e6c:cf29/64 scope link noprefixroute
valid_lft forever preferred_lft forever
3: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000
link/ether 52:54:00:26:ce:e5 brd ff:ff:ff:ff:ff:ff
inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0
valid_lft forever preferred_lft forever

ens192 为默认网卡

sudo tcpdump ‘port 9000’ -w a.cap -i ens192

监听 9000 端口 上的请求,指定 网卡 为 ens192 并将其保存到 a.cap 文件中

下载 a.cap 文件

将其 拉入到 wireshark 进行分析

sudo ln -s /Applications/Wireshark.app/Contents/MacOS/Wireshark /usr/local/bin/wireshark

wireshark a.cap

也可以将 a.cap 文件拉入到 wireshark 中进行查看

sudo tcpdump ‘port 18080’ -w 73_3.cap -i any

scp admin@192.168.40.73:/home/admin/73_3.cap ./