

# ip4 # only ip4 (you also get 6in4 tunnel) # proto \icmp # only icmp (some keywords need \escaping) # example filters (use and/or to combine)

# or use accomponied windows command script # on the receiving machine, you need to run # but likely you want to als filter: not port 22 # note that port 36000 is automatically filtered

# $1 Interface to listen (optional, eth0 default) wireshark.sh br-lan not port 22 #!/bin/sh Store the command file in the same folder as Wireshark (C:/Program Files/Wireshark/Whiresharkpipe.cmd)Įxample call. Store the shell anywhere (I put it in /etc/config/wireshark.sh so it gets backed up) You could just type the commands directly in the command line, but I made two small scripts for myself to make it easy. Just two commands, on OpenWRT and PC respectively: So you can view nice Wireshark UI from any OpenWRT device I was busy sniffing to wireshark using my OpenWRT switch port mirror config, when I found an easier and more flexible way.īasically use tcpdump into a netcat and pipe it directly into Wireshark on my PC. Edit: while my suggestion below is not invalid, there is in fact a specialy OpenWRT page that I had initially missed:
