First page Back Continue Last page Overview Graphics
Sample tcpdump TCP output
timestamp source.port dest.port flags beginning: ending bytes window
seq # seq #
09:32:43.910000 nmap.edu.1173 > dns.net.21: S 62697789:62697789(0) win 512
flags: TCP flags ( PSH, RST, SYN, FIN)
beginning seq #: for the initial connection, this is the initial sequence number (ISN)
from the source IP
ending seq #: this is the beginning sequence number + data bytes
bytes: data bytes (payload) in the TCP packet
window size: nmap.edu receive window (TCP buffer)
Notes: