tshark + wireshark+ssh
1 |
ssh root@HOST tcpdump -U -s0 -w - 'not port 22' | wireshark -k -i - |
tcpdump + wireshark + ssh
1 |
ssh root@server.com 'tshark -f "port !22" -w -' | wireshark -k -i - |
fifo方式
1 |
mkfifo /tmp/fifo; ssh-keygen; ssh-copyid root@remotehostaddress; sudo ssh root@remotehost "tshark -i eth1 -f 'not tcp port 22' -w -" > /tmp/fifo &; sudo wireshark -k -i /tmp/fifo; |
原文地址:
http://www.commandlinefu.com/commands/view/4373/analyze-traffic-remotely-over-ssh-w-wireshark