2012-01-29 24 views
1

我運行一個基於Django的HTTP服務器和我試圖收集使用tcpdump的HTTP標頭。無法獲得所需要的HTTP頭中tcpdump的

這裏是tcpdump命令:

$ sudo tcpdump -i lo0 -s 0 -B 524288 port 8000 

,這裏是輸出

19:55:55.388635 IP localhost.irdmi > localhost.50558: Flags [P.], seq 126:8318, ack 602, win 40830, options [nop,nop,TS val 1192418216 ecr 1192418216], length 8192 
    19:55:55.388649 IP localhost.50558 > localhost.irdmi: Flags [.], ack 8318, win 36734, options [nop,nop,TS val 1192418216 ecr 1192418216], length 0 
    19:55:55.388657 IP localhost.irdmi > localhost.50558: Flags [P.], seq 8318:16510, ack 602, win 40830, options [nop,nop,TS val 1192418216 ecr 1192418216], length 8192 
    19:55:55.388666 IP localhost.50558 > localhost.irdmi: Flags [.], ack 16510, win 32638, options [nop,nop,TS val 1192418216 ecr 1192418216], length 0 
    19:55:55.388673 IP localhost.irdmi > localhost.50558: Flags [P.], seq 16510:24702, ack 602, win 40830, options [nop,nop,TS val 1192418216 ecr 1192418216], length 8192 
    19:55:55.388682 IP localhost.50558 > localhost.irdmi: Flags [.], ack 24702, win 28542, options [nop,nop,TS val 1192418216 ecr 1192418216], length 0 
    19:55:55.388687 IP localhost.irdmi > localhost.50558: Flags [.], seq 24702:41034, ack 602, win 40830, options [nop,nop,TS val 1192418216 ecr 1192418216], length 16332 
    19:55:55.388691 IP localhost.irdmi > localhost.50558: Flags [P.], seq 41034:41086, ack 602, win 40830, options [nop,nop,TS val 1192418216 ecr 1192418216], length 52 
    19:55:55.388707 IP localhost.50558 > localhost.irdmi: Flags [.], ack 41086, win 20350, options [nop,nop,TS val 1192418216 ecr 1192418216], length 0 
    19:55:55.388714 IP localhost.irdmi > localhost.50558: Flags [P.], seq 41086:49278, ack 602, win 40830, options [nop,nop,TS val 1192418216 ecr 1192418216], length 8192 
    19:55:55.388722 IP localhost.50558 > localhost.irdmi: Flags [.], ack 49278, win 16254, options [nop,nop,TS val 1192418216 ecr 1192418216], length 0 
    19:55:55.388728 IP localhost.irdmi > localhost.50558: Flags [P.], seq 49278:61630, ack 602, win 40830, options [nop,nop,TS val 1192418216 ecr 1192418216], length 12352 
    19:55:55.388737 IP localhost.50558 > localhost.irdmi: Flags [.], ack 61630, win 10078, options [nop,nop,TS val 1192418216 ecr 1192418216], length 0 

有誰知道這裏有什麼問題嗎?爲什麼我無法獲得請求的完整HTTP標頭?我嘗試使用wireshark,但我在那裏得到一些其他的錯誤。

+0

use -vvv switch for more verbose output – 2012-03-16 12:34:21

回答

2

命令下面爲我工作去抓端口8000 HTTP標頭。 -s將抓取前1024個字節,因此您可以調整以獲取更多或更少的數據包數據。

tcpdump -i eth0 -s 1024 -l -A port 8000 
2

如果你想看到包的內容,你真的不希望使用tcpdump

使用tcpflow代替 - 這將顯示您的全部請求。甚至更好的辦法是,使用瀏覽器擴展名(如firebug)來查看比包嗅探更高級別的標頭。

要與tcpflow端口8000嗅探,使用tcpflow -c port 8000。它將顯示標準輸出中的所有流量。

相關問題