Wireshark: Difference between revisions
 (Created page with "=== Remote monitoring ===  It's not too hard to monitor another machine that may not have X on it.  First you have to TEMPORARILY allow [ssh root] on the exposed server, DO NO...")  | 
				No edit summary  | 
				||
| Line 1: | Line 1: | ||
=== Guidelines ===  | |||
* LEARN HOW TO FILTER, or be overwhelmed  | |||
* You can't see url path or query params when using https, they are encrypted  | |||
=== Remote monitoring ===  | === Remote monitoring ===  | ||
Revision as of 17:44, 28 January 2018
Guidelines
- LEARN HOW TO FILTER, or be overwhelmed
 - You can't see url path or query params when using https, they are encrypted
 
Remote monitoring
It's not too hard to monitor another machine that may not have X on it.
First you have to TEMPORARILY allow [ssh root] on the exposed server, DO NOT LEAVE THIS ON:
ssh bitpost emacs /etc/ssh/sshd_config # add root to AllowUsers
Then on the monitoring box, set up a shared pipe, use ssh to route a tcpdump, and capture it in wireshark.
ssh viper sudo su - mkfifo /tmp/bitpost_443 # make a shared pipe wireshark -k -i /tmp/bitpost_443 ssh bitpost "tcpdump -s 0 -U -n -w - -i eth0 not port 22" > /tmp/bitpost_443
FIX THE EXPOSED SERVER to disable [ssh root]:
ssh bitpost emacs /etc/ssh/sshd_config # remove root from AllowUsers