Using Wireshark remote capture with EVE-NG
The power of a packet capture is boundless… Sometimes its indeed a pcap that can save you nights of troubleshooting, so being able to get one quickly and easily is an ace up a neteng sleeve.
In this post I’ll show you how I use Wireshark’s remote capture ability to sniff on packets running in EVE-NG without being need to install any custom plugins or packages from EVE.
EVE-NG provides some integration packs with wrappers around Wireshark’s remote capture feature to make capturing a one-click task. The integration pack has all the needed software and some Duct tape to make it all work:
plink 0.73 (for wireshark) all necessary wrappers It will modify windows registry files for proper work
I would rather want to keep my registry untouched for a simple task like sniffing the packets from a remote location, therefore I always use Wireshark remote capture without installing any client packs from Eve. It feels more “appropriate”, though I wouldn’t mind to install the pack in a VM that I don’t care about much.
So, you are perfectly capable of sniffing on packets running in EVE by having Wireshark alone. Thats the procedure:
- Install wireshark
- In the EVE lab view grep the link name of an interface you want to capture from
2.1 right click on the device you want to capture from
2.2 select “Capture” menu
2.3 move mouse over the interface you want to capture from
2.4 get the interface name (
vunl0_1_0in my example)
- Open Wireshark and choose remote capture in the list of the capture interfaces
- Enter the address of your EVE hypervisor (can use names of your systems from ssh_config)
- Type down the interface name you got in step 2 (the
capture filterstatement generates automatically)
- Start capturing!
It might look like a lot of manual steps from the first sight, but it takes actually 10 seconds, since you only need to memorize the link name and type it once in the wireshark interface.
If you like what I’m doing here and in a mood for sending a token of appreciation, you can leave a comment, or use one of the buttons below