<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with wireshark]]></title><description><![CDATA[A list of topics that have been tagged with wireshark]]></description><link>http://community.onion.io/tags/wireshark</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 12:50:47 GMT</lastBuildDate><atom:link href="http://community.onion.io/tags/wireshark.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 21 Dec 2020 13:50:26 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Using WireShark to listen to your Omega2 network activity]]></title><description><![CDATA[<p dir="auto">If you want to be able to examine your Omega2(S)(+) network traffic, you can use these steps to use WireShark to listen to a tcpdump via ssh from your Omega. I run WireShark on Ubuntu 19 / 20 but this also works on Windoze.</p>
<p dir="auto">On Ubuntu:</p>
<p dir="auto">mkfifo /tmp/pipe<br />
sudo apt install wireshark-qt<br />
sudo chmod +x /usr/bin/dumpcap<br />
#The next command allows you to run wireshark as a user instead of sudo<br />
sudo dpkg-reconfigure wireshark-common<br />
wireshark -k -i /tmp/pipe &amp; ssh <a href="mailto:root@192.168.1.168" rel="nofollow">root@192.168.1.168</a> "tcpdump -i any -s 0 -U -w - not port 22" &gt; /tmp/pipe</p>
<p dir="auto">Wireshark will show its main window obscuring the fact that on the terminal your Omega2 is requesting a password. So switch back to the terminal and enter the root password for your Omega2, then back to WireShark and you'll start to see the traffic roll in.</p>
<p dir="auto">Since this process uses ssh, you can leverage ssh certificate authentication instead so you don't need to enter a password.</p>
]]></description><link>http://community.onion.io/topic/4361/using-wireshark-to-listen-to-your-omega2-network-activity</link><guid isPermaLink="true">http://community.onion.io/topic/4361/using-wireshark-to-listen-to-your-omega2-network-activity</guid><dc:creator><![CDATA[crispyoz]]></dc:creator><pubDate>Mon, 21 Dec 2020 13:50:26 GMT</pubDate></item><item><title><![CDATA[Demo Wifi AP sniffer]]></title><description><![CDATA[@Hank-Hill said in Demo Wifi AP sniffer:

Ekhau

As far I as know, there have been many problems (read: impossible) to set the Omega in monitor mode - see this post.
I didn't try yet but I think that with the GPS expansion it could be possible releasing something like that..
]]></description><link>http://community.onion.io/topic/2247/demo-wifi-ap-sniffer</link><guid isPermaLink="true">http://community.onion.io/topic/2247/demo-wifi-ap-sniffer</guid><dc:creator><![CDATA[tommaso tani]]></dc:creator><pubDate>Wed, 16 Aug 2017 17:49:08 GMT</pubDate></item></channel></rss>