ssh登录到F5进行抓包

标签:
it |
分类: Cisco&H3C |
通过ssh登录到F5
tcpdump -ni internal host 192.168.0.66(也可以把IP改成用户的IP,可以跟踪到用户请求的服务器是哪台)
http://s3/middle/75d63f00gc23fb57ebac2&690
按ctrl+z结束
tcpdump -ni internal host 192.168.0.66 -c 1000 -w inter.cap
把抓包结果保存成文件
右击“连接sftp标签”
get 文件名
lpwd
tcpdump -ni internal host 218.95.39.14
tcpdump -ni internal host 218.95.39.14 -c 1000 -w 218095039014.cap
tcpdump -ni internal host 121.12.116.219
tcpdump -ni internal host 121.12.116.219 -c 1000 -w 121012116219.cap
tcpdump -ni internal host 58.17.84.14
tcpdump -ni internal host 58.17.84.14 -c 1000 -w 58178414.cap
cap通过WIRESHARK打开