tshark -r traffic.pcap -T fields -e tcp.srcport -Y "ip.src == 192.168.100.103 and ip.dst == 192.168.100.106 and tcp.flags == 0x012 and tcp.srcport < 16384"
Here,
192.168.100.103 is victim and
192.168.100.106 is attacker.
attacker will request whether the port is open or not and the victim will reply so we need tcp.srcport.
tcp.flags == 0x012 meaning SYN, ACK because if the port is open then SYN, ACK flag will go to from victim to attacker.
Comments
Post a Comment