voici le résultat d'un "sudo tcpdump -i eth1 -vn"
12:02:00.071522 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 298)
0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from dd:dd:dd:00:00:01, length 270, xid 0x42000000, Flags [none]
Client-Ethernet-Address dd:dd:dd:00:00:01
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Discover
Client-ID Option 61, length 7: ether dd:dd:dd:00:00:01
Hostname Option 12, length 10: "Arduino-01"
Parameter-Request Option 55, length 3:
Subnet-Mask, Default-Gateway, Domain-Name-Server
12:02:00.071880 IP (tos 0x10, ttl 128, id 0, offset 0, flags [none], proto UDP (17), length 328)
192.168.100.22.67 > 192.168.100.100.68: BOOTP/DHCP, Reply, length 300, xid 0x42000000, Flags [none]
Your-IP 192.168.100.100
Server-IP 192.168.100.22
Client-Ethernet-Address dd:dd:dd:00:00:01
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Offer
Server-ID Option 54, length 4: 192.168.100.22
Lease-Time Option 51, length 4: 600
Subnet-Mask Option 1, length 4: 255.255.255.0
Default-Gateway Option 3, length 4: 192.168.100.22
Domain-Name-Server Option 6, length 4: 192.168.100.22
12:02:00.075312 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 310)
192.168.100.100.68 > 255.255.255.255.67: BOOTP/DHCP, Request from dd:dd:dd:00:00:01, length 282, xid 0x42000000, Flags [none]
Client-Ethernet-Address dd:dd:dd:00:00:01
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Request
Client-ID Option 61, length 7: ether dd:dd:dd:00:00:01
Hostname Option 12, length 10: "Arduino-01"
Requested-IP Option 50, length 4: 192.168.100.100
Server-ID Option 54, length 4: 192.168.100.22
Parameter-Request Option 55, length 3:
Subnet-Mask, Default-Gateway, Domain-Name-Server
12:02:00.075568 IP (tos 0x10, ttl 128, id 0, offset 0, flags [none], proto UDP (17), length 328)
192.168.100.22.67 > 192.168.100.100.68: BOOTP/DHCP, Reply, length 300, xid 0x42000000, Flags [none]
Your-IP 192.168.100.100
Server-IP 192.168.100.22
Client-Ethernet-Address dd:dd:dd:00:00:01
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: ACK
Server-ID Option 54, length 4: 192.168.100.22
Lease-Time Option 51, length 4: 600
Subnet-Mask Option 1, length 4: 255.255.255.0
Default-Gateway Option 3, length 4: 192.168.100.22
Domain-Name-Server Option 6, length 4: 192.168.100.22
12:02:04.812186 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.100.22 tell 192.168.100.100, length 46
12:02:04.812209 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.100.22 is-at 00:10:60:59:2d:19, length 28
12:02:04.813440 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 44)
192.168.100.100.2850 > 192.168.100.22.80: Flags [S], cksum 0x3977 (correct), seq 2560, win 768, options [mss 550], length 0
12:02:04.813488 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 44)
192.168.100.22.80 > 192.168.100.100.2850: Flags [S.], cksum 0x49ea (incorrect -> 0x26c9), seq 3729914548, ack 2561, win 14600, options [mss 1460], length 0
12:02:04.814515 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.100.2850 > 192.168.100.22.80: Flags [.], cksum 0x738e (correct), ack 1, win 1024, length 0
12:02:04.817815 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 572)
192.168.100.100.2850 > 192.168.100.22.80: Flags [P.], cksum 0x35c3 (correct), seq 1:533, ack 1, win 1024, length 532
12:02:04.817846 IP (tos 0x0, ttl 64, id 53891, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.22.80 > 192.168.100.100.2850: Flags [.], cksum 0x49e6 (incorrect -> 0x3936), ack 533, win 15428, length 0
12:02:04.818085 IP (tos 0x0, ttl 64, id 53892, offset 0, flags [DF], proto TCP (6), length 552)
192.168.100.22.80 > 192.168.100.100.2850: Flags [.], cksum 0x4be6 (incorrect -> 0x77d8), seq 1:513, ack 533, win 15428, length 512
12:02:04.818101 IP (tos 0x0, ttl 64, id 53893, offset 0, flags [DF], proto TCP (6), length 180)
192.168.100.22.80 > 192.168.100.100.2850: Flags [P.], cksum 0x4a72 (incorrect -> 0x7762), seq 513:653, ack 533, win 15428, length 140
12:02:04.818151 IP (tos 0x0, ttl 64, id 53894, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.22.80 > 192.168.100.100.2850: Flags [F.], cksum 0x49e6 (incorrect -> 0x36a9), seq 653, ack 533, win 15428, length 0
12:02:04.861887 IP (tos 0x0, ttl 64, id 53892, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.100.2850 > 192.168.100.22.80: Flags [FP.], cksum 0x6f71 (correct), seq 533, ack 513, win 1024, length 0
12:02:04.861949 IP (tos 0x0, ttl 64, id 53895, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.22.80 > 192.168.100.100.2850: Flags [.], cksum 0x49e6 (incorrect -> 0x36a8), ack 534, win 15428, length 0
12:02:04.863191 IP (tos 0x0, ttl 64, id 53893, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.100.2850 > 192.168.100.22.80: Flags [.], cksum 0x6eee (correct), ack 653, win 1024, length 0
12:02:04.863217 IP (tos 0x0, ttl 64, id 53896, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.22.80 > 192.168.100.100.2850: Flags [.], cksum 0x49e6 (incorrect -> 0x36a8), ack 534, win 15428, length 0
12:02:04.864105 IP (tos 0x0, ttl 64, id 53894, offset 0, flags [DF], proto TCP (6), length 40)
192.168.100.100.2850 > 192.168.100.22.80: Flags [FP.], cksum 0x6ee4 (correct), seq 533, ack 654, win 1024, length 0
Je ne sais pas si sa peut t'aider, je ne voit pas ou ce trouve la requete GET.
Merci
Timiti29