<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
<title><![CDATA[向东博客 专注WEB应用 构架之美 --- 构架之美，在于尽态极妍 | 应用之美，在于药到病除]]></title> 
<link>http://jackxiang.com/index.php</link> 
<description><![CDATA[赢在IT，Playin' with IT,Focus on Killer Application,Marketing Meets Technology.]]></description> 
<language>zh-cn</language> 
<copyright><![CDATA[向东博客 专注WEB应用 构架之美 --- 构架之美，在于尽态极妍 | 应用之美，在于药到病除]]></copyright>
<item>
<link>http://jackxiang.com/post//</link>
<title><![CDATA[[相当有用]tcpdump 通过ip看端口之Linux下用tcpdump查看某进程请求某个IP的端口情况。]]></title> 
<author>jack &lt;xdy108@126.com&gt;</author>
<category><![CDATA[Unix/LinuxC技术]]></category>
<pubDate>Fri, 19 Aug 2016 07:17:31 +0000</pubDate> 
<guid>http://jackxiang.com/post//</guid> 
<description>
<![CDATA[ 
	杨永(杨永) 08-19 15:14:56<br/>tcpdump -vnn host&nbsp;&nbsp;要挂载服务器的IP<br/>杨永(杨永) 08-19 15:15:07<br/>tcpdump -vnn host 192.168.151.201<br/>杨永(杨永) 08-19 15:17:01<br/>看情况得开下4046端口<br/>杨永(杨永) 08-19 15:17:12<br/>发给张腾让他开下<br/>杨永(杨永) 08-19 15:18:02<br/>10.71.182.97.55818 &gt; 192.168.151.201.4046<br/>卡在这了<br/>杨永(杨永) 08-19 15:18:09<br/>访问4046端口没权限 （ength 0）<br/>&nbsp;&nbsp;&nbsp;&nbsp;10.71.182.97.37218 &gt; 192.168.151.201.4046: Flags [S], cksum 0xf506 (correct), seq 2144183597, win 14600, options [mss 1460,sackOK,TS val 1372580057 ecr 0,nop,wscale 9], length 0<br/>——————————————————————————————————————————————<br/>&nbsp;&nbsp; 10.71.182.97.48860 &gt; 192.168.151.201.111: Flags [F.], cksum 0x0a06 (correct), seq 61, ack 33, win 29, options [nop,nop,TS val 1372580057 ecr 798553157], length 0<br/>15:16:24.794577 IP (tos 0x0, ttl 64, id 19956, offset 0, flags [DF], proto TCP (6), length 60)<br/>&nbsp;&nbsp;&nbsp;&nbsp;10.71.182.97.37218 &gt; 192.168.151.201.4046: Flags [S], cksum 0xf506 (correct), seq 2144183597, win 14600, options [mss 1460,sackOK,TS val 1372580057 ecr 0,nop,wscale 9], length 0<br/>15:16:24.795999 IP (tos 0x0, ttl 57, id 8451, offset 0, flags [DF], proto TCP (6), length 52)<br/>&nbsp;&nbsp;&nbsp;&nbsp;192.168.151.201.111 &gt; 10.71.182.97.48860: Flags [.], cksum 0xe7ea (correct), ack 62, win 8760, options [nop,nop,TS val 798553157 ecr 1372580057], length 0<br/>15:16:24.796009 IP (tos 0x0, ttl 57, id 8707, offset 0, flags [DF], proto TCP (6), length 52)<br/>&nbsp;&nbsp;&nbsp;&nbsp;192.168.151.201.111 &gt; 10.71.182.97.48860: Flags [F.], cksum 0xe7e9 (correct), seq 33, ack 62, win 8760, options [nop,nop,TS val 798553157 ecr 1372580057], length 0<br/>15:16:24.796014 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)<br/>&nbsp;&nbsp;&nbsp;&nbsp;10.71.182.97.48860 &gt; 192.168.151.201.111: Flags [.], cksum 0x0a04 (correct), ack 34, win 29, options [nop,nop,TS val 1372580058 ecr 798553157], length 0<br/>15:16:25.794390 IP (tos 0x0, ttl 64, id 19957, offset 0, flags [DF], proto TCP (6), length 60)<br/>&nbsp;&nbsp;&nbsp;&nbsp;10.71.182.97.37218 &gt; 192.168.151.201.4046: Flags [S], cksum 0xf11e (correct), seq 2144183597, win 14600, options [mss 1460,sackOK,TS val 1372581057 ecr 0,nop,wscale 9], length 0<br/>15:16:27.794397 IP (tos 0x0, ttl 64, id 19958, offset 0, flags [DF], proto TCP (6), length 60)<br/>&nbsp;&nbsp;&nbsp;&nbsp;10.71.182.97.37218 &gt; 192.168.151.201.4046: Flags [S], cksum 0xe94e (correct), seq 2144183597, win 14600, options [mss 1460,sackOK,TS val 1372583057 ecr 0,nop,wscale 9], length 0
]]>
</description>
</item><item>
<link>http://jackxiang.com/post//#blogcomment</link>
<title><![CDATA[[评论] [相当有用]tcpdump 通过ip看端口之Linux下用tcpdump查看某进程请求某个IP的端口情况。]]></title> 
<author> &lt;user@domain.com&gt;</author>
<category><![CDATA[评论]]></category>
<pubDate>Thu, 01 Jan 1970 00:00:00 +0000</pubDate> 
<guid>http://jackxiang.com/post//#blogcomment</guid> 
<description>
<![CDATA[ 
	
]]>
</description>
</item>
</channel>
</rss>