Tagged articles
37 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Sep 16, 2025 · Operations

10 Real‑World TCPDump Cases That Reveal Hidden Network Issues

This guide walks senior operations engineers through ten authentic production‑level network problems, demonstrating how to capture and analyze packets with TCPDump, interpret key TCP/IP indicators, and apply concrete fixes ranging from firewall rules to load‑balancer health‑check settings.

Case Studynetwork troubleshootingpacket analysis
0 likes · 18 min read
10 Real‑World TCPDump Cases That Reveal Hidden Network Issues
MaGe Linux Operations
MaGe Linux Operations
Sep 4, 2025 · Operations

Master tcpdump: Real-World Linux Network Troubleshooting Techniques

This comprehensive guide walks you through why tcpdump is essential for ops engineers, how to install and configure it, basic and advanced filtering commands, real incident case studies, performance tuning, security analysis, and integration with other tools, turning raw packet captures into actionable insights.

Performance MonitoringSecuritynetwork troubleshooting
0 likes · 22 min read
Master tcpdump: Real-World Linux Network Troubleshooting Techniques
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2025 · Operations

10 Real‑World TCPDump Cases That Uncover Hidden Network Problems

This article walks senior operations engineers through ten authentic production‑level TCPDump case studies, teaching core command options, packet‑analysis heuristics, and a systematic four‑step troubleshooting framework that turns network mysteries into clear, actionable solutions.

Operationslinuxnetwork troubleshooting
0 likes · 18 min read
10 Real‑World TCPDump Cases That Uncover Hidden Network Problems
DevOps Operations Practice
DevOps Operations Practice
Jul 7, 2025 · Information Security

Master TCPDump: Install, Capture, Filter, and Analyze Network Packets on Linux

This guide explains how to install TCPDump on various platforms, list network interfaces, capture traffic, apply filters by IP, port, or protocol, save and read capture files, and use advanced options like limiting packet count and displaying packet contents, empowering network and security professionals.

network capturepacket analysistcpdump
0 likes · 5 min read
Master TCPDump: Install, Capture, Filter, and Analyze Network Packets on Linux
Liangxu Linux
Liangxu Linux
Oct 31, 2024 · Information Security

Why Does a TCP Connection Reset? Understanding RST Packets Across All Stages

This article explains the purpose of TCP RST packets, how they appear during connection establishment, data transfer, firewall enforcement, and teardown, and provides practical techniques for distinguishing legitimate resets from spoofed or policy‑driven resets to improve network troubleshooting and security.

RSTTCPinformation security
0 likes · 10 min read
Why Does a TCP Connection Reset? Understanding RST Packets Across All Stages
Wukong Talks Architecture
Wukong Talks Architecture
Oct 25, 2024 · Backend Development

Debugging a TCP Communication Bug That Stops Device Production at 70% Due to Length Field Misalignment

The article details a mysterious production stall at 70% caused by a TCP packet length field misalignment when the configuration name is "rabbit‑TD", explains the step‑by‑step investigation using server logs and packet captures, identifies the root cause of the merged D4/D5 packets, and proposes two concrete fixes to correct the length handling.

BackendDebuggingTCP
0 likes · 10 min read
Debugging a TCP Communication Bug That Stops Device Production at 70% Due to Length Field Misalignment
Open Source Linux
Open Source Linux
Oct 18, 2024 · Information Security

Why Do TCP Connections Send RST Packets? Causes and Analysis Explained

This article explains what TCP RST packets are, why they appear during connection establishment, data transfer, and termination, and how to diagnose server‑side, client‑side, and firewall‑induced resets by examining sequence diagrams, common error conditions, and TTL differences.

RSTSecurityTCP
0 likes · 9 min read
Why Do TCP Connections Send RST Packets? Causes and Analysis Explained
Open Source Linux
Open Source Linux
Sep 26, 2024 · Information Security

Why Does a TCP Connection Send RST Packets? Deep Dive into Causes and Analysis

TCP RST packets, used to abruptly terminate or reject connections, appear at various stages—handshake, data transfer, and teardown—and can stem from server port closures, connection limits, malformed SYNs, firewall policies, timeouts, or middlebox interventions, with each scenario identifiable through detailed packet‑level analysis.

RSTTCPfirewall
0 likes · 9 min read
Why Does a TCP Connection Send RST Packets? Deep Dive into Causes and Analysis
Liangxu Linux
Liangxu Linux
Jul 1, 2023 · Information Security

Mastering TCPDump: Essential Commands and Real‑World Examples for Network Analysis

This guide explains what TCPDump is, why it matters for Linux network monitoring, how it works under the hood, its key features and security considerations, how to install it, a full breakdown of its command‑line options, and dozens of practical examples for capturing and filtering packets, including integration with Wireshark.

SecurityWiresharknetwork capture
0 likes · 13 min read
Mastering TCPDump: Essential Commands and Real‑World Examples for Network Analysis
Efficient Ops
Efficient Ops
Dec 5, 2022 · Operations

Mastering tcpdump: Essential Commands for Network Packet Capture and Analysis

This guide explains how to use tcpdump for capturing and filtering network packets on Linux, covering basic usage, interface selection, host and port filters, protocol-specific captures, combined expressions, limiting capture size, saving to files, and a practical troubleshooting scenario with nginx and Node.js.

linuxnetwork capturepacket analysis
0 likes · 7 min read
Mastering tcpdump: Essential Commands for Network Packet Capture and Analysis
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Detailed HTTPS Handshake Analysis Using Wireshark

This article explains the HTTPS protocol, its security advantages over HTTP, and provides a step‑by‑step Wireshark packet capture and analysis of a test website, covering TCP three‑way handshake, TLS ClientHello/ServerHello, certificate verification, key exchange, and encrypted data transmission.

HTTPSTLSTLS Handshake
0 likes · 15 min read
Detailed HTTPS Handshake Analysis Using Wireshark
MaGe Linux Operations
MaGe Linux Operations
Jun 26, 2022 · Information Security

Master Wireshark: Advanced Packet Filtering, Timing, and Analysis Techniques

This guide walks through Wireshark's powerful features for filtering packets by IP, protocol, and port, adjusting time display formats, viewing and modifying TCP sequence numbers, saving filtered captures, performing packet statistics, decoding logs, tracing TCP streams, and identifying device manufacturers via MAC addresses.

TCPWiresharkfiltering
0 likes · 6 min read
Master Wireshark: Advanced Packet Filtering, Timing, and Analysis Techniques
Liangxu Linux
Liangxu Linux
Jun 25, 2022 · Information Security

Master Wireshark: Advanced Packet Filtering, Timing, and Decoding Techniques

This guide walks through Wireshark's powerful features—including precise packet filtering, custom time display formats, absolute sequence number handling, exporting filtered captures, packet count statistics, decoding logs, TCP stream tracking, and manufacturer identification—to help engineers troubleshoot and analyze network traffic efficiently.

TCPWiresharknetwork troubleshooting
0 likes · 6 min read
Master Wireshark: Advanced Packet Filtering, Timing, and Decoding Techniques
Open Source Linux
Open Source Linux
Sep 23, 2021 · Information Security

Understanding TCP/IP Layers and Common Network Attacks: ARP, DoS, DNS

An in‑depth overview of network security threats reveals how attacks exploit vulnerabilities across TCP/IP layers—detailing ARP spoofing, DoS (including SYN flood), and DNS hijacking—and offers practical defense strategies such as packet analysis, firewall hardening, and proactive monitoring.

ARP AttackDNSDoS
0 likes · 10 min read
Understanding TCP/IP Layers and Common Network Attacks: ARP, DoS, DNS
Ops Development Stories
Ops Development Stories
Aug 18, 2021 · Information Security

How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy

This guide demonstrates how to use Python's Scapy library to extract IP addresses from PCAP files, sniff usernames and passwords from mail traffic, discover live hosts via SYN packets, launch MAC address table flooding attacks, and conduct ARP spoofing for man‑in‑the‑middle attacks, providing complete code examples.

ARP spoofingMAC FloodMITM
0 likes · 7 min read
How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy
ByteDance Dali Intelligent Technology Team
ByteDance Dali Intelligent Technology Team
Jun 24, 2021 · Fundamentals

A Comprehensive Analysis of the HTTP/2 Protocol: Architecture, Optimizations, and Practical Packet Capture Insights

This article provides a comprehensive technical analysis of the HTTP/2 protocol, detailing its architectural improvements over HTTP/1.1, including HPACK header compression, binary framing, stream multiplexing, and server push, while demonstrating practical packet capture techniques to illustrate its performance optimizations.

Binary FramingHPACK CompressionHTTP/2
0 likes · 15 min read
A Comprehensive Analysis of the HTTP/2 Protocol: Architecture, Optimizations, and Practical Packet Capture Insights
Open Source Linux
Open Source Linux
Mar 2, 2021 · Operations

How SLB Works: Exploring Load Balancer Modes and Packet Flows

This article explains the background of Server Load Balancing (SLB), details its three transmission modes—reverse proxy, transparent, and triangle—illustrates packet interactions with TCP and HTTP flows, and provides analysis of each mode using Wireshark captures.

NetworkingSLBpacket analysis
0 likes · 11 min read
How SLB Works: Exploring Load Balancer Modes and Packet Flows
Liangxu Linux
Liangxu Linux
Feb 9, 2021 · Information Security

Understanding DNS: From Hostnames to Secure Queries and Packet Anatomy

This article provides a comprehensive overview of the Domain Name System, explaining how hostnames map to IP addresses, the hierarchical distributed design of DNS servers, query processes, caching mechanisms, packet structures, common attack vectors, and defensive measures such as DNSSEC.

DNSDomain Name SystemNetworking
0 likes · 25 min read
Understanding DNS: From Hostnames to Secure Queries and Packet Anatomy
ITPUB
ITPUB
Jan 18, 2021 · Fundamentals

Understanding DNS: Basics, Query Process, Packet Structure, and Security

This comprehensive guide explains DNS fundamentals, hierarchical server architecture, query processes, packet structure, caching mechanisms, and common security threats, providing clear examples, diagrams, and practical insights for anyone preparing for networking interviews or deepening their understanding of internet name resolution.

DNSDomain Name SystemInternet
0 likes · 23 min read
Understanding DNS: Basics, Query Process, Packet Structure, and Security
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 18, 2020 · Databases

Analyzing MySQL Replication Heartbeat Incompatibility Caused by Large Binlog Transactions

The article investigates why MySQL replication reports the error “heartbeat is not compatible with local info” when large transactions exceed the 4 GB limit of the binlog's next_position field, reproduces the issue with a controlled experiment, analyzes packet structures, and proposes practical mitigation strategies.

HeartbeatLarge TransactionsReplication
0 likes · 7 min read
Analyzing MySQL Replication Heartbeat Incompatibility Caused by Large Binlog Transactions
Top Architect
Top Architect
Dec 17, 2020 · Operations

Understanding SLB (Server Load Balancer) Transmission Modes and Packet Analysis

This article explains the background of Server Load Balancing (SLB), describes its three transmission modes—reverse‑proxy, transparent, and triangular—and provides detailed packet‑level analysis of TCP/HTTP interactions for each mode, highlighting configuration nuances and security considerations.

SLBnetworkpacket analysis
0 likes · 11 min read
Understanding SLB (Server Load Balancer) Transmission Modes and Packet Analysis
Xueersi Online School Tech Team
Xueersi Online School Tech Team
Nov 6, 2020 · Databases

MySQL Protocol Analysis and Source Code Exploration

This article provides a detailed walkthrough of MySQL protocol analysis using Wireshark, covering SSL disabling, packet capture commands, step‑by‑step examination of handshake, authentication, database selection, query execution packets, and an in‑depth look at related source‑code functions and command enums.

Networkingdatabasemysql
0 likes · 15 min read
MySQL Protocol Analysis and Source Code Exploration
JD Tech Talk
JD Tech Talk
Aug 28, 2019 · Fundamentals

Understanding ARP and ICMP Protocols: Principles and Packet Analysis

This article explains the fundamentals of the ARP (Address Resolution Protocol) and ICMP (Internet Control Message Protocol), describing how they operate in LAN environments, detailing their packet structures, and illustrating their practical use through ping and tracert commands with packet capture analysis.

ARPICMPNetwork Protocols
0 likes · 7 min read
Understanding ARP and ICMP Protocols: Principles and Packet Analysis
21CTO
21CTO
Jun 21, 2019 · Fundamentals

Why Does an HTTP Request Involve Multiple TCP Handshakes? A Wireshark Deep Dive

Using Wireshark, this article dissects a complete HTTP request, explaining the TCP three‑way handshake, window scaling, SACK options, four‑step termination, and Keep‑Alive mechanisms, while illustrating each packet with screenshots and detailing how browsers may merge handshake steps for efficiency.

HTTPNetwork ProtocolsTCP
0 likes · 12 min read
Why Does an HTTP Request Involve Multiple TCP Handshakes? A Wireshark Deep Dive
Tencent Cloud Developer
Tencent Cloud Developer
May 10, 2019 · Information Security

Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies

The paper examines novel TCP reflection DDoS methods that exploit CDN IP ranges and increasingly use pure ACK responses, outlines their handshake‑state behavior, and proposes a per‑connection tracking defense algorithm—implemented in Tencent’s DaYu platform—to detect and mitigate SYN/ACK, ACK, and RST reflection flows without affecting legitimate traffic.

DDoSTCP reflectiondefense algorithm
0 likes · 10 min read
Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies
Programmer DD
Programmer DD
Jan 29, 2019 · Fundamentals

Deep Dive into HTTP: From Packet Capture to Protocol Mechanics

This comprehensive tutorial walks through capturing HTTP traffic with Wireshark and tcpdump, decodes raw TCP packets, explains request and response structures, explores encoding, MIME types, methods, status codes, and advanced topics such as proxies, caching, cookies, redirection, and connection management, giving developers a solid understanding of how HTTP works under the hood.

HTTPNetworkingTCP
0 likes · 30 min read
Deep Dive into HTTP: From Packet Capture to Protocol Mechanics