![]() PLINK_PATH : This is where you installed putty plink execute file (plink.exe).WIRESHARK_PATH : This is where you installed wireshark execute file (wireshark.exe).If you don't know this, type command ' ifconfig' on your linux.REMOTE_INTERFACE : linux ethernet interface (such as eth0, wlan0, etc).REMOTE_PASSWORD : password of linux account.REMOTE_ACCOUNT : linux account ( Use root account.You can fix variables for your environemnt.SET PLINK_PATH = "C:\Program Files\PuTTY\plink.exe " SET WIRESHARK_PATH = "C:\Program Files\Wireshark\Wireshark.exe " SET REMOTE_SERVER SET REMOTE_ACCOUNT SET REMOTE_PASSWORD SET REMOTE_INTERFACE REM execute command %PLINK_PATH% -ssh -pw %REMOTE_PASSWORD% %REMOTE_ACCOUNT% %REMOTE_SERVER% "tcpdump -s0 -U -w -i %REMOTE_INTERFACE% not port 22 " | %WIRESHARK_PATH% -i -k REM REM REM - REM install putty and wireshark on your windows pc. Build the command file(*.cmd) as REM - REM remotecap.cmd REM Example command for captruing eremote network packet REM using wireshark and tcpdump.sudo systemctl enable rvice (enable openssh server).sudo systemctl start rvice (start openssh server).sudo dnf install openssh-server (Fedora.sudo service ssh restart (restart openssh server).sudo service ssh status (check openssh server).sudo apt-get install openssh-server (Ubuntu).sudo apt-get install libpcap (Ubuntu, Debian).sudo yum install libpcap (Fedora, CentOS, Redhat). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |