一、客户端数据分析:
spu@spu:~/code/pcap$ tcpdump -r client_all.pcap -X
reading from file client_all.pcap, link-type EN10MB (Ethernet)
17:58:56.346748 IP 192.168.1.178.55814 > 192.168.1.117.socks: Flags [S], seq 2615205588, win 64240, options [mss 1460,sackOK,TS val 2960015764 ecr 0,nop,wscale 7], length 0
0x0000: 4500 003c 6c75 4000 4006 49cf c0a8 01b2 E..<lu@.@.I.....
0x0010: c0a8 0175 da06 0438 9be0 ded4 0000 0000 ...u...8........
0x0020: a002 faf0 7da0 0000 0204 05b4 0402 080a ....}...........
0x0030: b06e 4194 0000 0000 0103 0307 .nA.........
17:58:56.354743 IP 192.168.1.117.socks > 192.168.1.178.55814: Flags [S.], seq 3996464281, ack 2615205589, win 65160, options [mss 1460,sackOK,TS val 902936060 ecr 2960015764,nop,wscale 7], length 0
0x0000: 4500 003c 0000 4000 4006 b644 c0a8 0175 E..<..@.@..D...u
0x0010: c0a8 01b2 0438 da06 ee35 3499 9be0 ded5 ..