亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? sniffex.c

?? linux編程源代碼,其中是由大量的實(shí)例
?? C
?? 第 1 頁 / 共 2 頁
字號:
/* * sniffex.c * * Sniffer example of TCP/IP packet capture using libpcap. *  * Version 0.1.1 (2005-07-05) * Copyright (c) 2005 The Tcpdump Group * * This software is intended to be used as a practical example and  * demonstration of the libpcap library; available at: * http://www.tcpdump.org/ * **************************************************************************** * * This software is a modification of Tim Carstens' "sniffer.c" * demonstration source code, released as follows: *  * sniffer.c * Copyright (c) 2002 Tim Carstens * 2002-01-07 * Demonstration of using libpcap * timcarst -at- yahoo -dot- com *  * "sniffer.c" is distributed under these terms: *  * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 4. The name "Tim Carstens" may not be used to endorse or promote *    products derived from this software without prior written permission * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * <end of "sniffer.c" terms> * * This software, "sniffex.c", is a derivative work of "sniffer.c" and is * covered by the following terms: * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Because this is a derivative work, you must comply with the "sniffer.c" *    terms reproduced above. * 2. Redistributions of source code must retain the Tcpdump Group copyright *    notice at the top of this source file, this list of conditions and the *    following disclaimer. * 3. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 4. The names "tcpdump" or "libpcap" may not be used to endorse or promote *    products derived from this software without prior written permission. * * THERE IS ABSOLUTELY NO WARRANTY FOR THIS PROGRAM. * BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY * FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN * OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES * PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED * OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS * TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE * PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, * REPAIR OR CORRECTION. *  * IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING * WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR * REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, * INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING * OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED * TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY * YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER * PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE * POSSIBILITY OF SUCH DAMAGES. * <end of "sniffex.c" terms> *  **************************************************************************** * * Below is an excerpt from an email from Guy Harris on the tcpdump-workers * mail list when someone asked, "How do I get the length of the TCP * payload?" Guy Harris' slightly snipped response (edited by him to * speak of the IPv4 header length and TCP data offset without referring * to bitfield structure members) is reproduced below: *  * The Ethernet size is always 14 bytes. *  * <snip>...</snip> * * In fact, you *MUST* assume the Ethernet header is 14 bytes, *and*, if  * you're using structures, you must use structures where the members  * always have the same size on all platforms, because the sizes of the  * fields in Ethernet - and IP, and TCP, and... - headers are defined by  * the protocol specification, not by the way a particular platform's C  * compiler works.) * * The IP header size, in bytes, is the value of the IP header length, * as extracted from the "ip_vhl" field of "struct sniff_ip" with * the "IP_HL()" macro, times 4 ("times 4" because it's in units of * 4-byte words).  If that value is less than 20 - i.e., if the value * extracted with "IP_HL()" is less than 5 - you have a malformed * IP datagram. * * The TCP header size, in bytes, is the value of the TCP data offset, * as extracted from the "th_offx2" field of "struct sniff_tcp" with * the "TH_OFF()" macro, times 4 (for the same reason - 4-byte words). * If that value is less than 20 - i.e., if the value extracted with * "TH_OFF()" is less than 5 - you have a malformed TCP segment. * * So, to find the IP header in an Ethernet packet, look 14 bytes after  * the beginning of the packet data.  To find the TCP header, look  * "IP_HL(ip)*4" bytes after the beginning of the IP header.  To find the * TCP payload, look "TH_OFF(tcp)*4" bytes after the beginning of the TCP * header. *  * To find out how much payload there is: * * Take the IP *total* length field - "ip_len" in "struct sniff_ip"  * - and, first, check whether it's less than "IP_HL(ip)*4" (after * you've checked whether "IP_HL(ip)" is >= 5).  If it is, you have * a malformed IP datagram. * * Otherwise, subtract "IP_HL(ip)*4" from it; that gives you the length * of the TCP segment, including the TCP header.  If that's less than * "TH_OFF(tcp)*4" (after you've checked whether "TH_OFF(tcp)" is >= 5), * you have a malformed TCP segment. * * Otherwise, subtract "TH_OFF(tcp)*4" from it; that gives you the * length of the TCP payload. * * Note that you also need to make sure that you don't go past the end  * of the captured data in the packet - you might, for example, have a  * 15-byte Ethernet packet that claims to contain an IP datagram, but if  * it's 15 bytes, it has only one byte of Ethernet payload, which is too  * small for an IP header.  The length of the captured data is given in  * the "caplen" field in the "struct pcap_pkthdr"; it might be less than  * the length of the packet, if you're capturing with a snapshot length  * other than a value >= the maximum packet size. * <end of response> *  **************************************************************************** *  * Example compiler command-line for GCC: *   gcc -Wall -o sniffex sniffex.c -lpcap *  **************************************************************************** * * Code Comments * * This section contains additional information and explanations regarding * comments in the source code. It serves as documentaion and rationale * for why the code is written as it is without hindering readability, as it * might if it were placed along with the actual code inline. References in * the code appear as footnote notation (e.g. [1]). * * 1. Ethernet headers are always exactly 14 bytes, so we define this * explicitly with "#define". Since some compilers might pad structures to a * multiple of 4 bytes - some versions of GCC for ARM may do this - * "sizeof (struct sniff_ethernet)" isn't used. *  * 2. Check the link-layer type of the device that's being opened to make * sure it's Ethernet, since that's all we handle in this example. Other * link-layer types may have different length headers (see [1]). * * 3. This is the filter expression that tells libpcap which packets we're * interested in (i.e. which packets to capture). Since this source example * focuses on IP and TCP, we use the expression "ip", so we know we'll only * encounter IP packets. The capture filter syntax, along with some * examples, is documented in the tcpdump man page under "expression." * Below are a few simple examples: * * Expression			Description * ----------			----------- * ip					Capture all IP packets. * tcp					Capture only TCP packets. * tcp port 80			Capture only TCP packets with a port equal to 80. * ip host 10.1.2.3		Capture all IP packets to or from host 10.1.2.3. * **************************************************************************** * */#define APP_NAME		"sniffex"#define APP_DESC		"Sniffer example using libpcap"#define APP_COPYRIGHT	"Copyright (c) 2005 The Tcpdump Group"#define APP_DISCLAIMER	"THERE IS ABSOLUTELY NO WARRANTY FOR THIS PROGRAM."#include <pcap.h>#include <stdio.h>#include <string.h>#include <stdlib.h>#include <ctype.h>#include <errno.h>#include <sys/types.h>#include <sys/socket.h>#include <netinet/in.h>#include <arpa/inet.h>/* default snap length (maximum bytes per packet to capture) */#define SNAP_LEN 1518/* ethernet headers are always exactly 14 bytes [1] */#define SIZE_ETHERNET 14/* Ethernet addresses are 6 bytes */#define ETHER_ADDR_LEN	6/* Ethernet header */struct sniff_ethernet {        u_char  ether_dhost[ETHER_ADDR_LEN];    /* destination host address */        u_char  ether_shost[ETHER_ADDR_LEN];    /* source host address */        u_short ether_type;                     /* IP? ARP? RARP? etc */};/* IP header */struct sniff_ip {        u_char  ip_vhl;                 /* version << 4 | header length >> 2 */        u_char  ip_tos;                 /* type of service */        u_short ip_len;                 /* total length */        u_short ip_id;                  /* identification */        u_short ip_off;                 /* fragment offset field */        #define IP_RF 0x8000            /* reserved fragment flag */        #define IP_DF 0x4000            /* dont fragment flag */        #define IP_MF 0x2000            /* more fragments flag */        #define IP_OFFMASK 0x1fff       /* mask for fragmenting bits */        u_char  ip_ttl;                 /* time to live */        u_char  ip_p;                   /* protocol */        u_short ip_sum;                 /* checksum */        struct  in_addr ip_src,ip_dst;  /* source and dest address */};#define IP_HL(ip)               (((ip)->ip_vhl) & 0x0f)#define IP_V(ip)                (((ip)->ip_vhl) >> 4)/* TCP header */typedef u_int tcp_seq;struct sniff_tcp {        u_short th_sport;               /* source port */        u_short th_dport;               /* destination port */        tcp_seq th_seq;                 /* sequence number */        tcp_seq th_ack;                 /* acknowledgement number */        u_char  th_offx2;               /* data offset, rsvd */#define TH_OFF(th)      (((th)->th_offx2 & 0xf0) >> 4)        u_char  th_flags;        #define TH_FIN  0x01        #define TH_SYN  0x02        #define TH_RST  0x04        #define TH_PUSH 0x08        #define TH_ACK  0x10        #define TH_URG  0x20        #define TH_ECE  0x40        #define TH_CWR  0x80        #define TH_FLAGS        (TH_FIN|TH_SYN|TH_RST|TH_ACK|TH_URG|TH_ECE|TH_CWR)        u_short th_win;                 /* window */        u_short th_sum;                 /* checksum */        u_short th_urp;                 /* urgent pointer */};voidgot_packet(u_char *args, const struct pcap_pkthdr *header, const u_char *packet);voidprint_payload(const u_char *payload, int len);voidprint_hex_ascii_line(const u_char *payload, int len, int offset);voidprint_app_banner(void);voidprint_app_usage(void);/* * app name/banner */voidprint_app_banner(void){	printf("%s - %s\n", APP_NAME, APP_DESC);	printf("%s\n", APP_COPYRIGHT);	printf("%s\n", APP_DISCLAIMER);	printf("\n");

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品国产综合久久婷婷香蕉| 精品福利av导航| 欧美伦理电影网| 韩国三级中文字幕hd久久精品| 亚洲精品高清在线| 久久综合精品国产一区二区三区| 色综合一区二区| 国产米奇在线777精品观看| 亚洲永久免费视频| 亚洲国产精品精华液2区45| 日韩一级精品视频在线观看| 在线免费一区三区| 成人精品小蝌蚪| 国产永久精品大片wwwapp| 午夜激情久久久| 亚洲精品国产第一综合99久久| 国产精品无码永久免费888| 日韩一区二区三区四区五区六区| 色狠狠一区二区| 成人国产亚洲欧美成人综合网| 黑人巨大精品欧美一区| 五月婷婷综合在线| 亚洲一线二线三线视频| 亚洲摸摸操操av| 国产精品国产三级国产aⅴ入口 | 欧美三区免费完整视频在线观看| 成人理论电影网| 国产a视频精品免费观看| 久久69国产一区二区蜜臀| 午夜在线成人av| 亚洲国产精品久久久久秋霞影院| 亚洲精品免费一二三区| 日本一区二区三区国色天香| 国产日本亚洲高清| 中文字幕第一区第二区| 久久精品一区二区三区av | 综合婷婷亚洲小说| 中文字幕av不卡| 国产精品久久久一区麻豆最新章节| 精品国产免费一区二区三区四区| 制服丝袜亚洲网站| 337p亚洲精品色噜噜| 9191久久久久久久久久久| 欧美三日本三级三级在线播放| 欧美亚洲日本国产| 欧美日韩亚洲综合一区| 欧美日韩日日骚| 欧美一级二级在线观看| 日韩欧美一区二区久久婷婷| 精品欧美一区二区三区精品久久| 精品国产伦一区二区三区观看体验| 日韩三级av在线播放| 欧美一级片免费看| 精品国产人成亚洲区| 久久久久久99久久久精品网站| 久久久久国产精品麻豆ai换脸| 亚洲国产精品黑人久久久| 亚洲视频你懂的| 亚洲成人免费av| 欧美巨大另类极品videosbest | 国产成人8x视频一区二区| 国产成人精品一区二区三区四区| 成人免费毛片高清视频| 91免费看片在线观看| 欧美性受xxxx黑人xyx性爽| 在线成人免费视频| 久久亚洲捆绑美女| 中文字幕精品—区二区四季| 亚洲一区二区三区爽爽爽爽爽| 免费高清视频精品| 国产成人一区二区精品非洲| 99国内精品久久| 欧美一区二区三区视频免费播放| 精品久久久久久久人人人人传媒| 中文字幕在线不卡国产视频| 亚洲午夜私人影院| 国产另类ts人妖一区二区| 色哟哟精品一区| 日韩一级片在线播放| 国产精品久久久久7777按摩| 亚洲高清三级视频| 国产一区二区福利视频| 色素色在线综合| 亚洲精品在线三区| 亚洲一区视频在线| 国产精品影视在线观看| 欧美色大人视频| 亚洲国产精品激情在线观看| 图片区小说区国产精品视频| 风间由美中文字幕在线看视频国产欧美 | 国产精品国产三级国产普通话三级| 亚洲午夜激情网页| 国产成人免费网站| 欧美另类高清zo欧美| 国产精品天天看| 免费在线观看日韩欧美| 97久久精品人人澡人人爽| 日韩亚洲欧美成人一区| 亚洲欧美在线高清| 国产揄拍国内精品对白| 欧美日韩大陆一区二区| 自拍偷拍亚洲欧美日韩| 国内精品伊人久久久久av一坑 | 中文乱码免费一区二区| 日韩二区在线观看| 色婷婷av一区二区三区gif| 久久久久久久久97黄色工厂| 免费日韩伦理电影| 欧美亚洲日本一区| 亚洲视频免费在线观看| 成人一区二区三区在线观看| 欧美va亚洲va在线观看蝴蝶网| 亚洲午夜羞羞片| 91福利在线看| 亚洲视频一区二区在线观看| 成人午夜视频在线观看| 久久久久99精品一区| 久久精品免费看| 日韩精品一区二区三区中文不卡| 天堂资源在线中文精品| 日本伦理一区二区| 伊人开心综合网| 久久电影网站中文字幕| 欧美一区二区视频在线观看2022| 亚洲丰满少妇videoshd| 欧洲av在线精品| 尤物视频一区二区| 91色在线porny| 亚洲欧美视频在线观看| 粉嫩av一区二区三区在线播放| 国产欧美日韩在线视频| 国产激情偷乱视频一区二区三区| 亚洲精品在线免费播放| 九九国产精品视频| 精品欧美一区二区三区精品久久 | 亚洲欧美另类在线| jiyouzz国产精品久久| 日韩一区在线播放| 一本久久a久久精品亚洲| 亚洲日本在线观看| 91久久精品国产91性色tv| 玉米视频成人免费看| 欧美色精品在线视频| 日本一道高清亚洲日美韩| 欧美电影免费观看高清完整版在线| 裸体在线国模精品偷拍| 精品1区2区在线观看| 国产剧情一区二区三区| 中文字幕免费观看一区| 不卡视频一二三| 亚洲自拍偷拍av| 91精品国产综合久久精品app| 秋霞午夜鲁丝一区二区老狼| 精品久久人人做人人爱| 国产成人免费在线观看| 亚洲裸体xxx| 欧美精品第1页| 国产一区二区不卡老阿姨| 国产精品视频一二三区| 色婷婷激情综合| 日韩1区2区日韩1区2区| 久久久久久99精品| 91日韩在线专区| 日韩精品电影在线观看| 精品国产sm最大网站免费看| 成人在线一区二区三区| 一区二区免费看| 日韩丝袜情趣美女图片| 成人一区二区三区中文字幕| 亚洲一区二区四区蜜桃| 日韩午夜精品电影| 成人免费毛片aaaaa**| 亚洲综合丁香婷婷六月香| 精品成人一区二区三区四区| 99久久综合99久久综合网站| 亚洲国产aⅴ天堂久久| 亚洲精品在线三区| 欧美伊人久久久久久午夜久久久久| 日本vs亚洲vs韩国一区三区二区| 中文字幕乱码日本亚洲一区二区| 欧美日韩精品三区| 成人精品国产一区二区4080| 婷婷成人综合网| 国产欧美精品一区二区三区四区| 欧美日韩在线电影| 成人午夜视频网站| 美女视频第一区二区三区免费观看网站| 欧美激情一二三区| 欧美一区日韩一区| 91视频国产资源| 国产盗摄女厕一区二区三区| 亚洲福利视频一区| 国产精品色在线观看| 日韩你懂的在线播放| 色视频成人在线观看免| 国产成人8x视频一区二区| 免费在线看成人av| 亚洲图片一区二区| 国产精品色婷婷| 久久综合色综合88|