Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.122
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
tcpdump /
examples /
Delete
Unzip
Name
Size
Permission
Date
Action
atime.awk
529
B
-rw-r--r--
2019-09-30 16:47
packetdat.awk
1.39
KB
-rw-r--r--
2019-09-30 16:47
send-ack.awk
1.56
KB
-rw-r--r--
2019-09-30 16:47
stime.awk
567
B
-rw-r--r--
2019-09-30 16:47
Save
Rename
BEGIN { # we need the number of bytes in a packet to do the output # in packet numbers rather than byte numbers. if (packetsize <= 0) packetsize = 512 expectNext = 1 lastwin = -1 } { # convert tcp trace to send/ack form. n = split ($1,t,":") tim = t[1]*3600 + t[2]*60 + t[3] if (NR <= 1) { tzero = tim ltim = tim OFS = "\t" } if ($6 != "ack") { # we have a data packet record: # ignore guys with syn, fin or reset 'cause we # can't handle their sequence numbers. Try to # detect and add a flag character for 'anomalies': # * -> re-sent packet # - -> packet after hole (missing packet(s)) # # -> odd size packet if ($5 !~ /[SFR]/) { i = index($6,":") j = index($6,"(") strtSeq = substr($6,1,i-1) endSeq = substr($6,i+1,j-i-1) len = endSeq - strtSeq id = endSeq if (! timeOf[id]) timeOf[id] = tim if (endSeq - expectNext < 0) flag = "*" else { if (strtSeq - expectNext > 0) flag = "-" else if (len != packetsize) flag = "#" else flag = " " expectNext = endSeq } printf "%7.2f\t%7.2f\t%s send %s %d", tim-tzero, tim-ltim,\ flag, $5, strtSeq if (++timesSent[id] > 1) printf " (%.2f) [%d]", tim - timeOf[id], timesSent[id] if (len != packetsize) printf " <%d>", len } } else { id = $7 printf "%7.2f\t%7.2f\t%s ack %s %d", tim-tzero, tim-ltim,\ flag, $5, id if ($9 != lastwin) { printf " win %d", $9 lastwin = $9 } printf " (%.2f)", tim - timeOf[id] if (++timesAcked[id] > 1) printf " [%d]", timesAcked[id] } printf "\n" ltim = tim }