Include the saved data in your lab report.

What will be an ideal response?


tcpdump: listening on eth0
17:11:58.209112 arp who-has 10.0.1.12 tell 10.0.1.11
17:11:58.209206 arp reply 10.0.1.12 is-at 0:50:bf:75:16:94
17:11:58.209225 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:11:58.209684 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:11:59.217799 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:11:59.218161 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:12:00.227796 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:12:00.228161 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:12:01.237846 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:12:01.238209 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:12:02.247797 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:12:02.248164 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:12:02.248203 arp who-has 10.0.1.11 tell 10.0.1.12
17:12:02.248233 arp reply 10.0.1.11 is-at 0:50:bf:75:16:95

tcpdump -nl host 10.0.1.12 and \icmp
tcpdump: listening on eth0
17:23:06.239969 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)

17:23:06.240338 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:23:07.247803 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:23:07.248196 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:23:08.257795 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:23:08.258207 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:23:09.268091 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:23:09.268497 10.0.1.12 > 10.0.1.11: icmp: echo reply
17:23:10.267784 10.0.1.11 > 10.0.1.12: icmp: echo request (DF)
17:23:10.268263 10.0.1.12 > 10.0.1.11: icmp: echo reply
10 packets received by filter
0 packets dropped by kernel

Computer Science & Information Technology

You might also like to view...

The process that attempts to locate an appropriate Catch handler for an uncaught exception is known as:

a) laddering b) stack winding c) stack unwinding d) stack traversing

Computer Science & Information Technology

Which of the following is an advantage of using McAfee’santivirus software?

A) It’s affordable. B) It’s easy to use and configure. C) It offers different versions for different types of vulnerabilities. D) All of the above

Computer Science & Information Technology

If your worksheet is wider than one page, you will also want to repeat the row titles on each page when you print or view the worksheet

Indicate whether the statement is true or false

Computer Science & Information Technology

MC Flag__________ specifies that the element can store parsed character data (i.e., text).

a) PCDATA. b) CDATA. c) DATA. d) None of the above.

Computer Science & Information Technology