Skip to content
This repository has been archived by the owner on Dec 28, 2022. It is now read-only.

Commit

Permalink
Interface discovery now works, updated README.
Browse files Browse the repository at this point in the history
  • Loading branch information
frgtn committed Apr 10, 2012
1 parent d0173d3 commit ea593f0
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 4 deletions.
2 changes: 2 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
*.o
rpcapd
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ rpcapd is a daemon that provides remote traffic capture for Windows version of [

This is a fork of rpcapd modified to compile and work in Linux.

It is still quite messy and may not compile or work. Also contains a memory leak when client (Wireshark) is requesting available interfaces.
It is still quite messy and may not compile or work.

## Building
This fork ships with a patched libpcap version found in WinPcap library.
Expand All @@ -23,9 +23,9 @@ This tool is to be used with Windows clients connecting to the linux box. Launch

Root privileges are needed to capture the interfaces.

There are two ways to connect from a Windows box. One is to use GUI in Wireshark *Capture Options* dialog, but it's not cool and sometimes causes rpcapd child process to segfault during interface discovery.

Other way is to invoke wireshark from commnd line:
There are two ways to connect from a Windows box:
1. Use GUI in Wireshark *Capture Options* dialog. Tested on Wireshark 1.7.1.
2. Invoke wireshark from commnd line specifying capture interface directly:

wireshark -k -i rpcapd://<capture_box_ip>:<rpcapd_port>/<interface_to_capture>

Expand Down

0 comments on commit ea593f0

Please sign in to comment.