使用 Wireshark 做数据包分析时,有时候分组详情中的数据链路层会显示 Linux cooked capture ,这是 Linux 上 libpcap 所使用的伪协议(pseudo-protocol),有两种可能的情形:
[root@localhost ~]# tcpdump -D
1.eno1
2.usbmon1 (USB bus number 1)
3.eno2
4.usbmon2 (USB bus number 2)
5.enp59s0f0
6.enp59s0f1
7.any (Pseudo-device that captures on all interfaces)
8.lo
[root@localhost ~]# tcpdump -i any
+---------------------------+| Packet type || (2 Octets) |+---------------------------+| ARPHRD_ type || (2 Octets) |+---------------------------+| Link-layer address length || (2 Octets) |+---------------------------+| Link-layer address || (8 Octets) |+---------------------------+| Protocol type || (2 Octets) |+---------------------------+| Payload |. .. .. .
0, if the packet was specifically sent to us by somebody else;
1, if the packet was broadcast by somebody else;
2, if the packet was multicast, but not broadcast, by somebody else;
3, if the packet was sent to somebody else by somebody else;
4, if the packet was sent by us.
ARPHRD_ type(2字节)
链路层地址类型,Linux ARPHRD_ value,譬如 1 以太网
Link-layer address length(2字节)
数据包发送方的链路层地址长度,可以为 0
Link-layer address(8字节)
数据包发送方的链路层地址
Protocol type(2字节)
协议类型字段
详见 .html
sll 过滤 SLL-based 流量
sll.pkttype 过滤 Packet type ,例 sll.pkttype == 0
sll.hatype 过滤 Link-layer address type ,例 sll.hatype == 1
sll.halen 过滤 Link-layer address length ,例 sll.halen == 6
h 过滤 source mac,例 h == 00:00:00:00:00:00
pe 过滤协议类型,例
本文发布于:2024-01-29 09:57:52,感谢您对本站的认可!
本文链接:https://www.4u4v.net/it/170649347714483.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
留言与评论(共有 0 条评论) |