Created
May 5, 2022 11:08
-
-
Save michelep/e57307846ed7b3eaad68d8d98fee7758 to your computer and use it in GitHub Desktop.
Wireshark remote capture on Linux server
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1) Creo utente per tcpdump | |
groupadd tcpdump | |
addgroup <username> tcpdump | |
chown root.tcpdump /usr/sbin/tcpdump | |
chmod 0750 /usr/sbin/tcpdump | |
setcap "CAP_NET_RAW+eip" /usr/sbin/tcpdump | |
2) Imposto l'accesso senza password (con chiave SSH) | |
ssh-copy-id | |
3) Lancio il capture | |
wireshark '-oextcap.sshdump.remotehost:"remotehost"' -i sshdump -k |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment