tcpdump分析ICMP協議


ICMP協議字段解釋


ICMP協議

  • ICMP類型

ICMP報文類型

  • 代碼:不同的ICMP類型,可能還需要代碼做進一步的區分,比如type=3(終點不可達),就區分網絡不可達(0)主機不可達(1)協議不可達(2)端口不可達(3)
[root@bogon ~]# ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=101 time=43.3 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=101 time=42.8 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=101 time=42.8 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=101 time=42.7 ms
^C
--- 8.8.8.8 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3005ms
rtt min/avg/max/mdev = 42.785/42.959/43.389/0.355 ms
[root@bogon ~]# 

 

所有ICMP echo request 和ICMP echo reply的id 都一樣 id 44218,沒有變化

seq 單調遞增,一個ICMP echo request 和他的ICMP echo reply的seq一樣

 

[root@bogon ~]# tcpdump -i enahisic2i0  icmp -xnt -vvvv
tcpdump: listening on enahisic2i0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP (tos 0x0, ttl 64, id 14986, offset 0, flags [DF], proto ICMP (1), length 84)
    10.10.16.81 > 8.8.8.8: ICMP echo request, id 44218, seq 1, length 64
        0x0000:  4500 0054 3a8a 4000 4001 d5b4 0a0a 1051
        0x0010:  0808 0808 0800 8099 acba 0001 01db 9960
        0x0020:  0000 0000 6f9c 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
IP (tos 0x0, ttl 101, id 0, offset 0, flags [none], proto ICMP (1), length 84)
    8.8.8.8 > 10.10.16.81: ICMP echo reply, id 44218, seq 1, length 64
        0x0000:  4500 0054 0000 0000 6501 2b3f 0808 0808
        0x0010:  0a0a 1051 0000 8899 acba 0001 01db 9960
        0x0020:  0000 0000 6f9c 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
IP (tos 0x0, ttl 64, id 15033, offset 0, flags [DF], proto ICMP (1), length 84)
    10.10.16.81 > 8.8.8.8: ICMP echo request, id 44218, seq 2, length 64
        0x0000:  4500 0054 3ab9 4000 4001 d585 0a0a 1051
        0x0010:  0808 0808 0800 c692 acba 0002 02db 9960
        0x0020:  0000 0000 28a2 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
IP (tos 0x0, ttl 101, id 0, offset 0, flags [none], proto ICMP (1), length 84)
    8.8.8.8 > 10.10.16.81: ICMP echo reply, id 44218, seq 2, length 64
        0x0000:  4500 0054 0000 0000 6501 2b3f 0808 0808
        0x0010:  0a0a 1051 0000 ce92 acba 0002 02db 9960
        0x0020:  0000 0000 28a2 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
IP (tos 0x0, ttl 64, id 15041, offset 0, flags [DF], proto ICMP (1), length 84)
    10.10.16.81 > 8.8.8.8: ICMP echo request, id 44218, seq 3, length 64
        0x0000:  4500 0054 3ac1 4000 4001 d57d 0a0a 1051
        0x0010:  0808 0808 0800 688a acba 0003 03db 9960
        0x0020:  0000 0000 85a9 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
IP (tos 0x0, ttl 101, id 0, offset 0, flags [none], proto ICMP (1), length 84)
    8.8.8.8 > 10.10.16.81: ICMP echo reply, id 44218, seq 3, length 64
        0x0000:  4500 0054 0000 0000 6501 2b3f 0808 0808
        0x0010:  0a0a 1051 0000 708a acba 0003 03db 9960
        0x0020:  0000 0000 85a9 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
IP (tos 0x0, ttl 64, id 15132, offset 0, flags [DF], proto ICMP (1), length 84)
    10.10.16.81 > 8.8.8.8: ICMP echo request, id 44218, seq 4, length 64
        0x0000:  4500 0054 3b1c 4000 4001 d522 0a0a 1051
        0x0010:  0808 0808 0800 1f82 acba 0004 04db 9960
        0x0020:  0000 0000 cdb0 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637
IP (tos 0x0, ttl 101, id 0, offset 0, flags [none], proto ICMP (1), length 84)
    8.8.8.8 > 10.10.16.81: ICMP echo reply, id 44218, seq 4, length 64
        0x0000:  4500 0054 0000 0000 6501 2b3f 0808 0808
        0x0010:  0a0a 1051 0000 2782 acba 0004 04db 9960
        0x0020:  0000 0000 cdb0 0100 0000 0000 1011 1213
        0x0030:  1415 1617 1819 1a1b 1c1d 1e1f 2021 2223
        0x0040:  2425 2627 2829 2a2b 2c2d 2e2f 3031 3233
        0x0050:  3435 3637

 

 

 

字段

協議

內容

對應的tcpdump文字描述

0x04

ICMP消息類型

回送請求

ICMP echo request

0x00

ICMP代碼

   

0xcbae

16位校驗和

   

0x472e

ICMP數據標志

ICMP的ID

length 84

0x1f4c

16位的標識

數據報標識

id 18222

0x0001

ICMP序號

ICMP序號

seq 1


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM