This patch adds a little note how to start a wireshark frontend on the host side and pipe all traffic through a ssh connection. Signed-off-by: Alexander Aring <alex.aring@xxxxxxxxx> --- website/index.txt | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/website/index.txt b/website/index.txt index 4aaaab7..7331534 100644 --- a/website/index.txt +++ b/website/index.txt @@ -98,6 +98,14 @@ iwpan phy wpan-phy0 interface add monitor%d type monitor --------------------------------------------------------------------- Then bring this interface up and run wireshark, tcpdump, etc... on it. +Running a wireshark as sniffing frontend on the $HOST and connect to a $TARGET like Raspberry Pi which have some ethernet ssh connection, you can try: + +--------------------------------------------------------------------- +ssh root@$TARGET 'tshark -i monitor0 -w -' | wireshark -k -i - +--------------------------------------------------------------------- + +This will pipe all sniffing frames from $TARGET side to $HOST running wireshark application. +Note you need maybe to change the "$TARGET" and "montior0" to your settings. ////// Foren6 -- 2.2.2 -- To unsubscribe from this list: send the line "unsubscribe linux-wpan" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html