(no title)
psophis | 6 years ago
ssh root@sniff_server_ip -p port tcpdump -U -s0 'not port 22' -i eth0 -w - | wireshark -k -i -
Source: https://serverfault.com/questions/362529/how-can-i-sniff-the...It works very well on low volume captures.
psophis | 6 years ago
ssh root@sniff_server_ip -p port tcpdump -U -s0 'not port 22' -i eth0 -w - | wireshark -k -i -
Source: https://serverfault.com/questions/362529/how-can-i-sniff-the...It works very well on low volume captures.
turrini|6 years ago
wirelive.sh:
pstuart|6 years ago
neilv|6 years ago
BTW, for anyone new to tcpdump, you can also specify selectors/filtering on the command line, to reduce the traffic. The filtering in Wireshark is on top of that.
kayoone|6 years ago
unknown|6 years ago
[deleted]
iammeow|6 years ago
kees99|6 years ago
- On Linux, flush buffer at wrong places, breaking last (few) packet(s);
- On Windows, flush buffer after every byte (which gives acceptable result, but is very inefficient).
With "-w", always use "-U" instead.
ssebastianj|6 years ago
[0] https://openwrt.org/docs/guide-user/firewall/misc/tcpdump_wi...
kevintb|6 years ago