![]() ![]() The command must be able to produce a PCAP stream written to STDOUT. “C:\Program Files (x86)\PuTTY\plink.exe” -ssh -i “S:\mykey.pub” tcpdump -n -nn -s 0 -U -w – -i eth0 | “C:\Program Files\Wireshark\wireshark. A custom remote capture command that produces the remote stream that is shown in Wireshark.To monitor your remote Linux box, connecting with a key: “C:\Program Files (x86)\PuTTY\plink.exe” -ssh -pw password -n -nn -s 0 -U -w – -i eth0 | “C:\Program Files\Wireshark\wireshark.exe” -i – -k.Change this address relative to what data you want to capture. This will pipe the captured packets related to the address 192.168.0.7. To monitor your remote Linux box, connecting with a username and password: Once you have tcpdump installed you just need to run the following to start piping the data into Wireshark: 'tcpdump -i br-lan -U -s0 -w - host 192.168.0.7' wireshark -k -i. “C:\Program Files (x86)\PuTTY\plink.exe” -ssh -t -i “S:\mykey.pub” setcap cap_net_raw,cap_net_admin=eip /usr/sbin/tcpdump.p 22222 tcpdump -U -i IFACE -w - > FILE
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |