{"id":1655,"date":"2014-12-06T02:48:25","date_gmt":"2014-12-06T02:48:25","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=1655"},"modified":"2014-12-06T02:48:25","modified_gmt":"2014-12-06T02:48:25","slug":"3%e6%ac%a1%e6%8f%a1%e6%89%8b4%e6%ac%a1%e6%94%be%e6%89%8b","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/1655.html","title":{"rendered":"3\u6b21\u63e1\u624b&amp;4\u6b21\u653e\u624b"},"content":{"rendered":"<p>\u5728\u5927\u5b66\u91cc\u5b66\u4e60\u300a\u8ba1\u7b97\u673a\u7f51\u7edc\u300b\u7684\u8bfe\u7a0b\u7684\u65f6\u5019\uff0c\u975e\u5e38\u91cd\u8981\u7684\u4e00\u4e2a\u5185\u5bb9\u5c31\u662fTCP\u76843\u6b21\u63e1\u624b\u521b\u5efa\u8fde\u63a5\u548c4\u6b21\u5206\u624b\u65ad\u5f00\u8fde\u63a5\uff0c\u5148\u7528Wireshark\u6293\u5305\u770b\u4e2a\u5b9e\u4f8b\uff1a<\/p>\n<p><a href=\"http:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2014\/12\/syn_syn-ack_ack.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1656\" src=\"http:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2014\/12\/syn_syn-ack_ack.png\" alt=\"syn_syn-ack_ack\" width=\"1166\" height=\"507\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h6>\u4e00\u4e9b\u53c2\u8003\u94fe\u63a5\uff1a<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.tcpipguide.com\/free\/t_TCPConnectionEstablishmentProcessTheThreeWayHandsh-3.htm\" target=\"_blank\">The TCP\/IP Guide &#8211; TCP Connection Establishment Process: The &#8220;Three-Way Handshake&#8221;<\/a><\/li>\n<li><a href=\"http:\/\/www.tcpipguide.com\/free\/t_TCPConnectionTermination-2.htm\" target=\"_blank\">The TCP\/IP Guide &#8211; TCP Connection Termination<\/a><\/li>\n<li><a href=\"http:\/\/www.inetdaemon.com\/tutorials\/internet\/tcp\/3-way_handshake.shtml\" target=\"_blank\">TCP 3-Way Handshake (SYN,SYN-ACK,ACK) &#8211; InetDaemon&#8217;s IT Tutorials<\/a><\/li>\n<li><a href=\"http:\/\/www-01.ibm.com\/support\/knowledgecenter\/SSB23S_1.1.0.10\/com.ibm.ztpf-ztpfdf.doc_put.10\/gtps5\/s5tcpcf.html?cp=SSB23S_1.1.0.10%2F0-1-8-2-4-0\" target=\"_blank\">IBM Knowledge Center &#8211; TCP connection flow<\/a><\/li>\n<li><a href=\"http:\/\/blog.sina.com.cn\/s\/blog_ae41ba3c01017zqm.html\" target=\"_blank\">\u4e09\u6b21\u63e1\u624b\u548c\u56db\u6b21\u653e\u624b_BecauseOfPig<\/a><\/li>\n<li><a href=\"http:\/\/www.guokr.com\/post\/528646\/\" target=\"_blank\">TCP\u72b6\u6001\u8f6c\u6362\u56fe&#8211;\u4ece\u642d\u8baa\u5230\u70ed\u604b\u5230\u5206\u624b<\/a><\/li>\n<li><a href=\"http:\/\/nmap.org\/misc\/split-handshake.pdf\" target=\"_blank\">http:\/\/nmap.org\/misc\/split-handshake.pdf<\/a><\/li>\n<li><a href=\"http:\/\/repo.hackerzvoice.net\/depot_madchat\/ebooks\/TCP-IP_Illustrated\/tcp_conn.htm\" target=\"_blank\">Chapter 18. TCP Connection Establishment and Termination<\/a><\/li>\n<li><a href=\"http:\/\/www.freesoft.org\/CIE\/Course\/Section4\/11.htm\" target=\"_blank\">TCP Connection Close<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>\u7406\u89e3\u4e86\u4e0a\u9762\u7684\u4e4b\u540e\uff0c\u8fd8\u9700\u8981\u7406\u89e3\u4e00\u4e0b\u5728TCP\u4f20\u8f93\u8fc7\u7a0b\u4e2d\u7684seq\u548cack\u53f7\u4ee3\u8868\u7684\u610f\u601d\u548c\u4f5c\u7528\uff1a<\/p>\n<p><a href=\"http:\/\/packetlife.net\/blog\/2010\/jun\/7\/understanding-tcp-sequence-acknowledgment-numbers\/\" target=\"_blank\">Understanding TCP Sequence and Acknowledgment Numbers &#8211; PacketLife.net<\/a><\/p>\n<p>&nbsp;<\/p>\n<h6>\u8865\u5145\uff1a\u4e00\u4e9b\u7f51\u7edc\u6d41\u91cf\u5206\u6790\u5de5\u5177\/\u8bf4\u660e<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.cs.wustl.edu\/~jain\/cse567-06\/ftp\/net_traffic_monitors3\/index.html\" target=\"_blank\">A Survey of Network Traffic Monitoring and Analysis Tools<\/a><\/li>\n<li><a href=\"http:\/\/packetlife.net\/library\/cheat-sheets\/\" target=\"_blank\">Cheat Sheets &#8211; PacketLife.net<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u5728\u5927\u5b66\u91cc\u5b66\u4e60\u300a\u8ba1\u7b97\u673a\u7f51\u7edc\u300b\u7684\u8bfe\u7a0b\u7684\u65f6\u5019\uff0c\u975e\u5e38\u91cd\u8981\u7684\u4e00\u4e2a\u5185\u5bb9\u5c31\u662fTCP\u76843\u6b21\u63e1\u624b\u521b\u5efa\u8fde\u63a5\u548c4\u6b21\u5206\u624b\u65ad\u5f00\u8fde\u63a5\uff0c\u5148\u7528 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[413],"class_list":["post-1655","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","tag-tcpip"],"views":5643,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/1655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=1655"}],"version-history":[{"count":0,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/1655\/revisions"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=1655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=1655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=1655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}