Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revisionBoth sides next revision
docs:guide-user:firewall:misc:tcpdump_wireshark [2022/10/08 16:40] – [Capturing packets from an OpenWrt appliance] add example targeting a specific IP darksky2docs:guide-user:firewall:misc:tcpdump_wireshark [2023/01/24 17:09] – confirm working for me cm
Line 14: Line 14:
  
 Update 2020-09-19: One person has confirmed its still working on a iptime device (mt7620) running 20.172.67167 Update 2020-09-19: One person has confirmed its still working on a iptime device (mt7620) running 20.172.67167
 +
 +Update 2023-01-24: One person has confirmed its still working on a Xiaomi device running 22.03.2
 </WRAP> </WRAP>
  
Line 53: Line 55:
   ssh root@myledebox tcpdump -i eth1 -U -s0 -w - 'not port 22' | "C:\Program Files\Wireshark\Wireshark.exe" -k -i -   ssh root@myledebox tcpdump -i eth1 -U -s0 -w - 'not port 22' | "C:\Program Files\Wireshark\Wireshark.exe" -k -i -
  
 +Another option is to use the sshdump tool in wireshark, like so: 
 +<code> 
 +wireshark '-oextcap.sshdump.remotehost:OpenWrt.lan' '-oextcap.sshdump.remoteusername:root' -i sshdump -k 
 +</code>
 ===== Capturing packets from a switch ===== ===== Capturing packets from a switch =====
  
  • Last modified: 2023/01/27 17:20
  • by cm