java抓包教程_java基础-抓包工具的使用

1.在windows环境下

a90e5761a80545d8296b65b44011661a.png

4090ea1bdebc6c243888f04d011c537e.png

然后 就可以分析tcp的报文了

但是捕获环回数据包不行,比如我本地启动了一个tomcat应用,用本地环回数据包捕获 就无法捕获。

2.在linux环境下,我们可以使用tcpdump来进行分析

[root@paas-boss-db1 tcpdump-4.3.0]# ./tcpdump port 8080

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes

09:48:56.189411 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4506: Flags [F.], seq 3372045395, ack 4061102965, win 63, length 0

09:48:56.189511 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4503: Flags [F.], seq 3363610217, ack 766993567, win 88, length 0

09:48:56.190118 IP 192.168.11.251.4503 > PAAS-BOSS-DB1.webcache: Flags [.], ack 1, win 64240, length 0

09:48:56.190149 IP 192.168.11.251.4506 > PAAS-BOSS-DB1.webcache: Flags [.], ack 1, win 63997, length 0

09:48:56.190346 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4505: Flags [F.], seq 3364472081, ack 2651406034, win 71, length 0

09:48:56.190433 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4507: Flags [F.], seq 3368042724, ack 796427157, win 54, length 0

09:48:56.190532 IP 192.168.11.251.4506 > PAAS-BOSS-DB1.webcache: Flags [F.], seq 1, ack 1, win 63997, length 0

09:48:56.190543 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4506: Flags [.], ack 2, win 63, length 0

09:48:56.190608 IP 192.168.11.251.4507 > PAAS-BOSS-DB1.webcache: Flags [.], ack 1, win 64075, length 0

09:48:56.190620 IP 192.168.11.251.4505 > PAAS-BOSS-DB1.webcache: Flags [.], ack 1, win 64200, length 0

09:48:56.191317 IP 192.168.11.251.4505 > PAAS-BOSS-DB1.webcache: Flags [F.], seq 1, ack 1, win 64200, length 0

09:48:56.191322 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4505: Flags [.], ack 2, win 71, length 0

09:48:56.191450 IP 192.168.11.251.4507 > PAAS-BOSS-DB1.webcache: Flags [F.], seq 1, ack 1, win 64075, length 0

09:48:56.191456 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4507: Flags [.], ack 2, win 54, length 0

09:48:56.191594 IP 192.168.11.251.4503 > PAAS-BOSS-DB1.webcache: Flags [F.], seq 1, ack 1, win 64240, length 0

09:48:56.191602 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4503: Flags [.], ack 2, win 88, length 0

09:48:57.935215 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.ipsec-nat-t: Flags [F.], seq 3367166939, ack 591490835, win 105, length 0

09:48:57.935994 IP 192.168.11.251.ipsec-nat-t > PAAS-BOSS-DB1.webcache: Flags [.], ack 1, win 64021, length 0

09:48:57.936401 IP 192.168.11.251.ipsec-nat-t > PAAS-BOSS-DB1.webcache: Flags [F.], seq 1, ack 1, win 64021, length 0

09:48:57.936413 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.ipsec-nat-t: Flags [.], ack 2, win 105, length 0

09:48:58.667198 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4502: Flags [F.], seq 3367552596, ack 2873947055, win 71, length 0

09:48:58.667906 IP 192.168.11.251.4502 > PAAS-BOSS-DB1.webcache: Flags [.], ack 1, win 64240, length 0

09:48:58.668218 IP 192.168.11.251.4502 > PAAS-BOSS-DB1.webcache: Flags [F.], seq 1, ack 1, win 64240, length 0

09:48:58.668231 IP PAAS-BOSS-DB1.webcache > 192.168.11.251.4502: Flags [.], ack 2, win 71, length 0

另外 我们还可以把linux下面抓包的内容 拿到鲨鱼里面进行分析

./tcpdump -w tcp.out tcp port 5222

然后下载tcp.out 文件,到鲨鱼里面进行分析

399f97d339ff86f15746eab6ab73edcd.png

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值