In the same terminal, open the capture file using the following command to view the first 3 TCP packets captured:

View the Packets Using tcpdump


```
[analyst@secOps ~]# tcpdump -r /home/analyst/capture.pcap tcp -c 3
reading from file capture.pcap, link-type EN10MB (Ethernet)
13:58:30.647462 IP 10.0.0.11.58716 > 172.16.0.40.http: Flags [S], seq
2432755549, win 29200, options [mss 1460,sackOK,TS val 3864513189 ecr
0,nop,wscale 9], length 0
13:58:30.647543 IP 172.16.0.40.http > 10.0.0.11.58716: Flags [S.], seq
1766419191, ack 2432755550, win 28960, options [mss 1460,sackOK,TS val 50557410
ecr 3864513189,nop,wscale 9], length 0
13:58:30.647544 IP 10.0.0.11.58716 > 172.16.0.40.http: Flags [.], ack 1, win
58, options [nop,nop,TS val 3864513189 ecr 50557410], length 0
To view the 3-way handshake, you may need to increase the number of lines after the -c
option.
```

Computer Science & Information Technology

You might also like to view...

Select the element used to hyperlink web pages to each other from the list below:

a. link b. hyperlink c. anchor d. target

Computer Science & Information Technology

A(n) ________ program is an open program that cannot be closed by using any of the program's commands

A) nonresponsive B) runaway C) uncontrolled D) impaired

Computer Science & Information Technology

List guidelines that should be followed in a MobileApp testing strategy.

What will be an ideal response?

Computer Science & Information Technology

An Active Directory object that usually represents a person for informational purposes only, much like an address book entry.

What will be an ideal response?

Computer Science & Information Technology