• About
  • Disclaimer
  • Privacy Policy
  • Contact
Sunday, June 15, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Computer Networking

Understanding TCPDUMP Output – 51 Safety

Md Sazzad Hossain by Md Sazzad Hossain
0
Understanding TCPDUMP Output – 51 Safety
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

Powering All Ethernet AI Networking

5G is Shifting Downstream to Enterprises


[Expert@Pub-cp2:0]# tcpdump -vvv -nn -i eth1-01 host 19.26.16.19
tcpdump: listening on eth1-01, link-type EN10MB (Ethernet), seize dimension 96 bytes
11:39:04.822700 IP (tos 0x0, ttl 126, id 7241, offset 0, flags [DF], proto: TCP (6), size: 52) 19.26.16.19.10747 > 19.26.16.24.443: S, cksum 0xea51 (right), 2579834556:2579834556(0) win 8192   //SYN
11:39:04.826136 IP (tos 0x0, ttl  63, id 0, offset 0, flags [DF], proto: TCP (6), size: 52) 19.26.16.24.443 > 19.26.16.19.10747: S, cksum 0x99db (right), 487537799:487537799(0) ack 2579834557 win 5840  // SYN ACK
11:39:04.826153 IP (tos 0x0, ttl  63, id 0, offset 0, flags [DF], proto: TCP (6), size: 52) 19.26.16.24.443 > 19.26.16.19.10747: S, cksum 0x99db (right), 487537799:487537799(0) ack 2579834557 win 5840  // This packet is repeated SYN ACK
11:39:04.826926 IP (tos 0x0, ttl 125, id 7242, offset 0, flags [DF], proto: TCP (6), size: 52) 19.26.16.19.10747 > 10.9.1.25.443: ., cksum 0xd4d0 (right), 2579834557:2579834557(0) ack 487537800 win 256  //ACK
11:39:06.883076 IP (tos 0x0, ttl 125, id 7243, offset 0, flags [DF], proto: TCP (6), size: 42) 19.26.16.19.10747 > 10.9.1.25.443: P, cksum 0xb101 (right), 0:2(2) ack 1 win 256
11:39:06.883285 IP (tos 0x0, ttl  63, id 16050, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: ., cksum 0xf14d (right), 1:1(0) ack 3 win 46
11:39:07.048713 IP (tos 0x0, ttl 125, id 7244, offset 0, flags [DF], proto: TCP (6), size: 42) 19.26.16.19.10747 > 10.9.1.25.443: P, cksum 0xb0ff (right), 2:4(2) ack 1 win 256
11:39:07.048905 IP (tos 0x0, ttl  63, id 16051, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: ., cksum 0xf14b (right), 1:1(0) ack 5 win 46
11:39:07.199352 IP (tos 0x0, ttl 125, id 7245, offset 0, flags [DF], proto: TCP (6), size: 42) 19.26.16.19.10747 > 10.9.1.25.443: P, cksum 0xb0fd (right), 4:6(2) ack 1 win 256
11:39:07.199883 IP (tos 0x0, ttl  63, id 16052, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: ., cksum 0xf149 (right), 1:1(0) ack 7 win 46
11:39:07.342045 IP (tos 0x0, ttl 125, id 7246, offset 0, flags [DF], proto: TCP (6), size: 42) 19.26.16.19.10747 > 10.9.1.25.443: P, cksum 0xb0fb (right), 6:8(2) ack 1 win 256
11:39:07.342228 IP (tos 0x0, ttl  63, id 16053, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: ., cksum 0xf147 (right), 1:1(0) ack 9 win 46
11:39:07.492210 IP (tos 0x0, ttl 125, id 7247, offset 0, flags [DF], proto: TCP (6), size: 42) 19.26.16.19.10747 > 10.9.1.25.443: P, cksum 0xb0f9 (right), 8:10(2) ack 1 win 256
11:39:07.492407 IP (tos 0x0, ttl  63, id 16054, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: ., cksum 0xf145 (right), 1:1(0) ack 11 win 46
11:39:07.634867 IP (tos 0x0, ttl 125, id 7248, offset 0, flags [DF], proto: TCP (6), size: 42) 19.26.16.19.10747 > 10.9.1.25.443: P, cksum 0xb0f7 (right), 10:12(2) ack 1 win 256
11:39:07.635119 IP (tos 0x0, ttl  63, id 16055, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: ., cksum 0xf143 (right), 1:1(0) ack 13 win 46
11:39:07.635269 IP (tos 0x0, ttl  63, id 16056, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: F, cksum 0xf142 (right), 1:1(0) ack 13 win 46
11:39:07.635864 IP (tos 0x0, ttl 125, id 7249, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.19.10747 > 10.9.1.25.443: ., cksum 0xbe08 (right), 12:12(0) ack 2 win 256
11:39:07.635927 IP (tos 0x0, ttl 125, id 7250, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.19.10747 > 10.9.1.25.443: F, cksum 0xbe07 (right), 12:12(0) ack 2 win 256
11:39:07.636058 IP (tos 0x0, ttl  63, id 0, offset 0, flags [DF], proto: TCP (6), size: 40) 19.26.16.24.443 > 19.26.16.19.10747: ., cksum 0xf141 (right), 2:2(0) ack 14 win 46

Tags: OutputSecurityTCPDUMPUnderstanding
Previous Post

It has been an enormous week for the AI copyright debate

Next Post

Main On-line Platform for Youngster Exploitation Dismantled

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies
Computer Networking

Addressing Vulnerabilities in Positioning, Navigation and Timing (PNT) Companies

by Md Sazzad Hossain
June 14, 2025
Powering All Ethernet AI Networking
Computer Networking

Powering All Ethernet AI Networking

by Md Sazzad Hossain
June 14, 2025
5G is Shifting Downstream to Enterprises
Computer Networking

5G is Shifting Downstream to Enterprises

by Md Sazzad Hossain
June 14, 2025
That is Extending to GreenOps – IT Connection
Computer Networking

AWS Summit Sydney – Accelerating AI from Prospects to Manufacturing – IT Connection

by Md Sazzad Hossain
June 13, 2025
Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.
Computer Networking

Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.

by Md Sazzad Hossain
June 13, 2025
Next Post
Main On-line Platform for Youngster Exploitation Dismantled

Main On-line Platform for Youngster Exploitation Dismantled

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Can product house owners succeed with simply no-code AI instruments like Lovable, Vercel, and Bolt?

Can product house owners succeed with simply no-code AI instruments like Lovable, Vercel, and Bolt?

May 20, 2025
Cohere Launched Command A: A 111B Parameter AI Mannequin with 256K Context Size, 23-Language Assist, and 50% Value Discount for Enterprises

Cohere Launched Command A: A 111B Parameter AI Mannequin with 256K Context Size, 23-Language Assist, and 50% Value Discount for Enterprises

March 17, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Dutch police determine customers as younger as 11-year-old on Cracked.io hacking discussion board

Dutch police determine customers as younger as 11-year-old on Cracked.io hacking discussion board

June 15, 2025

Ctrl-Crash: Ny teknik för realistisk simulering av bilolyckor på video

June 15, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In