DNS attack experiment
摘要:
ghostli123@ghostli123-HP-Pro-3380-MT:~/Yang/12.29/tcpdump-4.3.0$ tcpdump -r ../2012.udp.pcap port 53 -w pureDNS.pcapreading from file ../2012.udp.pcap, link-type EN10MB (Ethernet)tcpdump: pcap_loop: bogus savefile headerghostli123@ghostli123-HP-Pro-3380-MT:~/Yang/12.29/tcpdump-4.3.0$ tcpdump -r pure 阅读全文
posted @ 2013-01-21 22:43 ghostli123 阅读(427) 评论(0) 推荐(0) 编辑