Indice

Remote capture using tcpdump and Wireshark

On **server**

Create a named pipe:

  # mkfifo /tmp/tcpdump

make it readable only by a local user that will connect from remote

  # chown lele /tmp/tcpdump
  # chmod 600 /tmp/tcpdump

Run tcpdump as root and redirect the packets to the named pipe:

  # tcpdump -s 0 -U -n -w - -i eth0 not port 22 > /tmp/tcpdump

On **client**

Create a named pipe:

  $ mkfifo /tmp/remote

Start wireshark from the command line pointing at the created pipe

  $ wireshark -k -i /tmp/remote &

Tunnel data via ssh from remote pipe to local pipe:

  $ ssh unprivuser@firewall "cat /tmp/tcpdump" > /tmp/remote

Nota

Le pipe si aprono quando vengono lette da wireshark e vengono chiuse (compreso il processo che sta scrivendo e cioe' tcpdump) quando wireshark ferma la cattura.