[root@192 ~]# yum -y install tcpdump socat
[root@192 ~]# socat -u UDP-LISTEN:9999,fork -
开放一个udp的服务端,持续监听
[root@192 ~]# echo "Hello, UDP Server" | socat - UDP:192.168.100.132:9999
再开一个终端发送udp请求
[root@192 ~]# socat -u UDP-LISTEN:9999,fork -
Hello, UDP Server
Hello, UDP Server
Hello, UDP Server
查看udp服务端发现 显示信息
[root@192 ~]# tcpdump -i any udp port 9999
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
22:48:16.864661 IP 192.168.100.132.47482 > 192.168.100.132.distinct: UDP, length 18
22:48:18.025725 IP 192.168.100.132.57232 > 192.168.100.132.distinct: UDP, length 18
tcpdump也能抓住发送过来的udp
[root@192 ~]# tcpdump -i any tcp port 80
抓tcp
[root@192 ~]# tcpdump -i ens32 port 80 and src host 192.168.100.3
抓tcp并过滤来源
标签:UDP,tcpdump,实践,192.168,192,100.132,root
From: https://www.cnblogs.com/supermao12/p/18424673