• 4、SYN-RCVD


    4、SYN-RCVD
    
    需要使用防火墙来模拟:
    
    1.禁止指定IP地址的主机进行连接
    iptables -I INPUT -s .***.***. -j DROP
    
    2.解除禁止指定IP地址的主机进行连接
    iptables -D INPUT -s .***.***. -j DROP
    
    
    iptables -I INPUT -s 192.168.137.2 -j DROP
    
    
    
    iptables -D INPUT -s 192.168.137.2 -j DROP
    
    
    
    
    服务端:
    
    node1:/root#netstat -na | grep 8080
    tcp        0      0 192.168.137.2:8080          0.0.0.0:*                   LISTEN      
    tcp        0      0 192.168.137.2:8080          192.168.137.3:56405         SYN_RECV  
    
    
    
    模拟拒绝 服务端的192.168.137.2所有连接:
    
    服务端收到SYN报文以后会回复 SYN+ACK,然后等待对端 ACK 的时候进入SYN-RCVD,完整的代码见:state_syn_rcvd.pkt
    
    
    0 packets dropped by kernel
    node1:/root#tcpdump -S -i eth1 '((tcp) and  (port 8080) )' 
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
    
    
    20:01:21.618679 IP node2.19202 > 1.1.1.1.webcache: Flags [S], seq 2444177452, win 14600, options [mss 1460,sackOK,TS val 316653172 ecr 0,nop,wscale 7], length 0
    20:01:46.241273 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316677793 ecr 0,nop,wscale 7], length 0
    20:01:46.241316 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21470510 ecr 316677793,nop,wscale 6], length 0
    20:01:47.240413 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316678794 ecr 0,nop,wscale 7], length 0
    20:01:47.240439 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21471509 ecr 316677793,nop,wscale 6], length 0
    20:01:47.440834 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21471710 ecr 316677793,nop,wscale 6], length 0
    20:01:49.243107 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316680795 ecr 0,nop,wscale 7], length 0
    20:01:49.243373 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21473512 ecr 316677793,nop,wscale 6], length 0
    20:01:49.642918 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21473912 ecr 316677793,nop,wscale 6], length 0
    20:01:53.241295 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316684795 ecr 0,nop,wscale 7], length 0
    20:01:53.241554 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21477510 ecr 316677793,nop,wscale 6], length 0
    20:01:53.845129 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21478114 ecr 316677793,nop,wscale 6], length 0
    20:02:01.241037 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316692795 ecr 0,nop,wscale 7], length 0
    20:02:01.241057 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21485510 ecr 316677793,nop,wscale 6], length 0
    20:02:01.850088 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21486119 ecr 316677793,nop,wscale 6], length 0
    20:02:17.241349 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316708795 ecr 0,nop,wscale 7], length 0
    20:02:17.241367 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21501510 ecr 316677793,nop,wscale 6], length 0
    20:02:17.859327 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21502128 ecr 316677793,nop,wscale 6], length 0
    ^C
    
    
    
    
    
    客户端:
    
    node2:/root#tcpdump -S -i eth1 '((tcp) and  (port 8080) )'
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
    20:47:16.099375 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316677793 ecr 0,nop,wscale 7], length 0
    20:47:16.130282 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21470510 ecr 316677793,nop,wscale 6], length 0
    20:47:17.099629 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316678794 ecr 0,nop,wscale 7], length 0
    20:47:17.100312 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21471509 ecr 316677793,nop,wscale 6], length 0
    20:47:17.300368 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21471710 ecr 316677793,nop,wscale 6], length 0
    20:47:19.100498 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316680795 ecr 0,nop,wscale 7], length 0
    20:47:19.103199 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21473512 ecr 316677793,nop,wscale 6], length 0
    20:47:19.502571 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21473912 ecr 316677793,nop,wscale 6], length 0
    20:47:23.100465 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316684795 ecr 0,nop,wscale 7], length 0
    20:47:23.101372 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21477510 ecr 316677793,nop,wscale 6], length 0
    20:47:23.704749 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21478114 ecr 316677793,nop,wscale 6], length 0
    20:47:31.100324 IP node2.56405 > node1.webcache: Flags [S], seq 543801636, win 14600, options [mss 1460,sackOK,TS val 316692795 ecr 0,nop,wscale 7], length 0
    20:47:31.100506 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21485510 ecr 316677793,nop,wscale 6], length 0
    20:47:31.709696 IP node1.webcache > node2.56405: Flags [S.], seq 3838238406, ack 543801637, win 14480, options [mss 1460,sackOK,TS val 21486119 ecr 316677793,nop,wscale 6], length 0
    
    tcp        0      1 192.168.137.3:56405         192.168.137.2:8080          SYN_SENT    
    node2:/root#netstat -na |grep 8080
    tcp        0      1 192.168.137.3:56405         192.168.137.2:8080          SYN_SENT    
    
  • 相关阅读:
    微信公众平台开发教程(一) 微信公众账号注册流程
    DNS----域名解析系统
    C#编程总结(九)字符编码
    向大神学习
    C# 正则表达式
    js 正则表达式 取反
    H5 打开App
    Fiddler 过滤器的使用
    Fiddler 默认不能抓取页面信息的问题
    js 元素Dom新建并插入页面createElement
  • 原文地址:https://www.cnblogs.com/hzcya1995/p/13348477.html
Copyright © 2020-2023  润新知