It’s years since I have needed it, but I know that tshark works well in a Linux console. You can also write filter expressions to display just the protocols of interest. The manual page is (or at least used to be) good documentation.
On Aug 25, 2020, at 08:53, Felipe Veiga Ramos <fvrlistas2@gmail.com> wrote:
Greetings; I hope you all are ok and safe from this Corona!
Lastly, I'm in need to use Wireshark very often and, I conffess, I don't get used to yet. Although it is usable and have a lot of hotkeys, I found few information about them.
Anyway, on Windows, with NVDA, I'm doing a relatively good work, but on Linux my tries were poor. But, most of time, I need to snif networks inside the Linux, mainly docker infraestructures. Once I can't use it on Linux, I'm trying to connect my windows Wireshark trough SSH on the Linux machine, inside a virtual machine. After tis long but necessary preamble, my questions:
1.When I connect wireshark through SSH on my Linux VM, the passoword isn't saved. That means I need to redo all the connect proccess every time I restart the capture. Do you lads know how to make the password persistent?
2.If the first possibility isn't possible, could someone to have another solution to that? I had tried to redirect the trafic of every interface to a host-only interface using IPTables, but got no good result: besides a lot of trash, the important packets aren't coming.
3.Last but not least, do you all have any tip, material or information about using wireshark mainly through NVDA that you can share?
Important informations: Windows 10pro -64bits
NVDA:2020.2
Wireshark: 3.2.4
VMware Workstation 15 Player: 15.5.6 build-16341506
Thank you all! Felipe
-- Felipe Veiga Ramos _______________________________________________ Blind-sysadmins mailing list -- blind-sysadmins@lists.hodgsonfamily.org To unsubscribe send an email to blind-sysadmins-leave@lists.hodgsonfamily.org