export MANPAGER='nvim +Man!'
Export the environment variable (source the shell config file) and test that it works.
Use tcpdump to output outgoing NTP queries and incoming http(s) responses. Use the -d
flag to see an objdump of the filter program's code.
Complete the tcpdump command in order to satisfy the following formatting requirements:
How to test:
$ ntpdate -q ro.pool.ntp.org
$ curl ocw.cs.pub.ro
-D
. In addition to your network interfaces, you may also see a Bluetooth device or the dbus-system (depending on your desktop).
If you don't specify the interface with -i
, the first entry in the printed list will be used by default. This may not always be your active network interface but in stead, your docker bridge (for example).
Write an iptables rule according to the following specifications:
How to test:
$ sudo curl www.google.com $ sudo dmesg
multiport, owner modules
$ man 8 iptables-extensions
Write an iptables rule according to the following specifications:
Continue appending the same rule with incremented TTL value until the DNS request goes through.
How to test:
$ dig +short fep.grid.pub.ro @8.8.8.8
$ man 8 iptables-extensions nfbpf_compile
If you are working on Ubuntu, there is a chance that nfbpf_compile did not come with the iptables package (oh Canonical… maybe there's something in the Universe repos?).
Anyway, you can still install it manually:
$ sudo apt install libpcap-dev $ wget https://raw.githubusercontent.com/netgroup-polito/iptables/master/utils/nfbpf_compile.c $ gcc -o nfbpf_compile nfbpf_compile.c -lpcap
Also, use this man page rather than installing it separately.
Give an example when iptables is unable to catch a packet.