ARP请求数据包中包括源主机A的IP地址、MAC地址及目标主机B的IP地址.网络中的所有主机收到这个ARP请求后,检查数据包中的目的IP地址是否和自己的IP地址一致,如果不相同,则丢弃该数据包;如果相同,该主机首先将发送端的MAC地址和IP地址添加到自己的ARP列表中.如果ARP列表中己经存在该IP的信息,则将其授盖.然后给源主机A发送一个 ARP响应数据包,告诉对方自己是它查找的 MAC 地址.
# 对目标主机www.diaoan.xyz进行路由追踪并反向分析 $ nmap --packet-trace -sn -PS -R --traceroute www.diaoan.xyz Starting Nmap 7.92 ( https://nmap.org ) at 2022-01-25 20:50 CST SENT (0.1909s) TCP 192.168.43.245:33235 > 121.199.61.226:80 S ttl=45 id=45901 iplen=44 seq=1218553367 win=1024 <mss 1460> RCVD (0.2240s) TCP 121.199.61.226:80 > 192.168.43.245:33235 SA ttl=116 id=1167 iplen=44 seq=3079631607 win=8192 <mss 1400> SENT (0.3814s) TCP 192.168.43.245:36968 > 121.199.61.226:80 S ttl=10 id=45523 iplen=44 seq=3185375790 win=43212 <mss 1460> SENT (0.3815s) TCP 192.168.43.245:36969 > 121.199.61.226:80 S ttl=9 id=31781 iplen=44 seq=2407042503 win=24590 <mss 1460> SENT (0.3815s) TCP 192.168.43.245:36970 > 121.199.61.226:80 S ttl=8 id=50526 iplen=44 seq=2167780263 win=20125 <mss 1460> SENT (0.3816s) TCP 192.168.43.245:36971 > 121.199.61.226:80 S ttl=7 id=45631 iplen=44 seq=486263963 win=28028 <mss 1460> SENT (0.3816s) TCP 192.168.43.245:36972 > 121.199.61.226:80 S ttl=6 id=28030 iplen=44 seq=1506814108 win=41759 <mss 1460> SENT (0.3817s) TCP 192.168.43.245:36973 > 121.199.61.226:80 S ttl=5 id=44856 iplen=44 seq=2744161118 win=65248 <mss 1460> SENT (0.3817s) TCP 192.168.43.245:36974 > 121.199.61.226:80 S ttl=4 id=11656 iplen=44 seq=650162866 win=40705 <mss 1460> SENT (0.3817s) TCP 192.168.43.245:36975 > 121.199.61.226:80 S ttl=3 id=56059 iplen=44 seq=644040787 win=14787 <mss 1460> SENT (0.3817s) TCP 192.168.43.245:36960 > 121.199.61.226:80 S ttl=2 id=52876 iplen=44 seq=422641921 win=20043 <mss 1460> SENT (0.3817s) TCP 192.168.43.245:36961 > 121.199.61.226:80 S ttl=1 id=53956 iplen=44 seq=2321457656 win=10238 <mss 1460> RCVD (0.3820s) ICMP [192.168.32.1 > 192.168.43.245 TTL=0 during transit (type=11/code=0) ] IP [ttl=64 id=0 iplen=72 ] RCVD (0.3869s) ICMP [192.168.1.1 > 192.168.43.245 TTL=0 during transit (type=11/code=0) ] IP [ttl=63 id=44090 iplen=72 ] SENT (0.3920s) TCP 192.168.43.245:36962 > 121.199.61.226:80 S ttl=11 id=29178 iplen=44 seq=521622099 win=23897 <mss 1460> SENT (0.3920s) TCP 192.168.43.245:36963 > 121.199.61.226:80 S ttl=12 id=28275 iplen=44 seq=3744876770 win=24343 <mss 1460> SENT (1.3919s) TCP 192.168.43.245:36975 > 121.199.61.226:80 S ttl=3 id=53594 iplen=44 seq=2898075093 win=59343 <mss 1460> SENT (1.3920s) TCP 192.168.43.245:36974 > 121.199.61.226:80 S ttl=4 id=27904 iplen=44 seq=1505420095 win=30026 <mss 1460> SENT (1.3920s) TCP 192.168.43.245:36973 > 121.199.61.226:80 S ttl=5 id=51953 iplen=44 seq=86616698 win=20526 <mss 1460> SENT (1.3920s) TCP 192.168.43.245:36972 > 121.199.61.226:80 S ttl=6 id=60704 iplen=44 seq=668724196 win=37580 <mss 1460> SENT (1.3920s) TCP 192.168.43.245:36971 > 121.199.61.226:80 S ttl=7 id=36675 iplen=44 seq=3547798000 win=36086 <mss 1460> SENT (1.3920s) TCP 192.168.43.245:36970 > 121.199.61.226:80 S ttl=8 id=54809 iplen=44 seq=1804226636 win=32550 <mss 1460> SENT (1.3921s) TCP 192.168.43.245:36969 > 121.199.61.226:80 S ttl=9 id=8614 iplen=44 seq=1524594925 win=52162 <mss 1460> SENT (1.3921s) TCP 192.168.43.245:36968 > 121.199.61.226:80 S ttl=10 id=33934 iplen=44 seq=1626967471 win=57854 <mss 1460> SENT (1.4029s) TCP 192.168.43.245:36963 > 121.199.61.226:80 S ttl=12 id=10057 iplen=44 seq=1486341433 win=55627 <mss 1460> SENT (1.4030s) TCP 192.168.43.245:36962 > 121.199.61.226:80 S ttl=11 id=39712 iplen=44 seq=952695547 win=34755 <mss 1460> SENT (2.4022s) TCP 192.168.43.245:36968 > 121.199.61.226:80 S ttl=10 id=36199 iplen=44 seq=1664326775 win=16683 <mss 1460> SENT (2.4023s) TCP 192.168.43.245:36969 > 121.199.61.226:80 S ttl=9 id=38000 iplen=44 seq=3934527502 win=7944 <mss 1460> SENT (2.4023s) TCP 192.168.43.245:36970 > 121.199.61.226:80 S ttl=8 id=36777 iplen=44 seq=1765018069 win=60545 <mss 1460> SENT (2.4023s) TCP 192.168.43.245:36971 > 121.199.61.226:80 S ttl=7 id=49008 iplen=44 seq=3889004093 win=41478 <mss 1460> SENT (2.4024s) TCP 192.168.43.245:36972 > 121.199.61.226:80 S ttl=6 id=19879 iplen=44 seq=2380950869 win=4181 <mss 1460> SENT (2.4024s) TCP 192.168.43.245:36973 > 121.199.61.226:80 S ttl=5 id=12082 iplen=44 seq=3588669308 win=36125 <mss 1460> SENT (2.4024s) TCP 192.168.43.245:36974 > 121.199.61.226:80 S ttl=4 id=62747 iplen=44 seq=3287699441 win=28350 <mss 1460> SENT (2.4024s) TCP 192.168.43.245:36975 > 121.199.61.226:80 S ttl=3 id=1956 iplen=44 seq=1358640367 win=18974 <mss 1460> SENT (2.4126s) TCP 192.168.43.245:36962 > 121.199.61.226:80 S ttl=11 id=63722 iplen=44 seq=1850056978 win=13178 <mss 1460> SENT (2.4127s) TCP 192.168.43.245:36963 > 121.199.61.226:80 S ttl=12 id=39346 iplen=44 seq=850201853 win=16631 <mss 1460> SENT (3.4128s) TCP 192.168.43.245:36964 > 121.199.61.226:80 S ttl=13 id=64888 iplen=44 seq=2169021136 win=36694 <mss 1460> SENT (3.4129s) TCP 192.168.43.245:36965 > 121.199.61.226:80 S ttl=14 id=23457 iplen=44 seq=1579234833 win=3615 <mss 1460> SENT (3.4129s) TCP 192.168.43.245:36966 > 121.199.61.226:80 S ttl=15 id=35635 iplen=44 seq=2567726766 win=63006 <mss 1460> SENT (3.4130s) TCP 192.168.43.245:36967 > 121.199.61.226:80 S ttl=16 id=32174 iplen=44 seq=3239502888 win=58744 <mss 1460> SENT (3.4130s) TCP 192.168.43.245:36984 > 121.199.61.226:80 S ttl=17 id=10142 iplen=44 seq=1023412669 win=24186 <mss 1460> SENT (3.4131s) TCP 192.168.43.245:36985 > 121.199.61.226:80 S ttl=18 id=53176 iplen=44 seq=1002514773 win=45158 <mss 1460> SENT (3.4131s) TCP 192.168.43.245:36986 > 121.199.61.226:80 S ttl=19 id=30560 iplen=44 seq=1060264654 win=36752 <mss 1460> SENT (3.4131s) TCP 192.168.43.245:36987 > 121.199.61.226:80 S ttl=20 id=38483 iplen=44 seq=3024023676 win=23404 <mss 1460> SENT (3.4237s) TCP 192.168.43.245:36988 > 121.199.61.226:80 S ttl=21 id=32396 iplen=44 seq=770022349 win=32670 <mss 1460> SENT (3.4238s) TCP 192.168.43.245:36989 > 121.199.61.226:80 S ttl=22 id=57596 iplen=44 seq=3409485228 win=38153 <mss 1460> RCVD (3.4416s) TCP 121.199.61.226:80 > 192.168.43.245:36964 SA ttl=116 id=1168 iplen=44 seq=4209584110 win=8192 <mss 1400> RCVD (3.4424s) TCP 121.199.61.226:80 > 192.168.43.245:36966 SA ttl=116 id=1169 iplen=44 seq=318779088 win=8192 <mss 1400> RCVD (3.4424s) TCP 121.199.61.226:80 > 192.168.43.245:36967 SA ttl=116 id=1171 iplen=44 seq=3526794468 win=8192 <mss 1400> Nmap scan report for www.diaoan.xyz (121.199.61.226) Host is up (0.033s latency).
TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 0.25 ms DIAOAN (192.168.32.1) 2 5.20 ms TianYi.Home (192.168.1.1) 3 ... 12 13 28.92 ms www.diaoan.xyz (121.199.61.226)
# 跳过主机发现,直接对目标www.diaoan.xyz进行高强度扫描 $ nmap --packet-trace -P0 www.diaoan.xyz seq=1552475743 win=1024 <mss 1460> SENT (8.6640s) TCP 192.168.1.4:43876 > 121.199.61.226:1217 S ttl=46 id=29607 iplen=44 seq=1552475743 win=1024 <mss 1460> ...... Nmap scan report for www.diaoan.xyz (121.199.61.226) Host is up (0.032s latency). Not shown: 988 filtered tcp ports (no-response) PORT STATE SERVICE 80/tcp open http 443/tcp open https