From 9c1b9b5bca608f56d61aa2fafe14f477be8254c5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Roberto=20Abdelkader=20Mart=C3=ADnez=20P=C3=A9rez?= Date: Fri, 6 Sep 2019 13:22:47 +0200 Subject: [PATCH] Proper code box --- poc/examples/tcpdump/README.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/poc/examples/tcpdump/README.md b/poc/examples/tcpdump/README.md index 3b91b3e..c51894a 100644 --- a/poc/examples/tcpdump/README.md +++ b/poc/examples/tcpdump/README.md @@ -6,7 +6,11 @@ Remote tcpdump sniffer with source filtering 2. For the sake of simplicity run `sudo kapow server tcpdump.pow`. In a production environment tcpdump should be run with the appropiate permissions but kapow can (and should) run as an unprivilieged user. -3. In your local machine run `curl http://localhost:8080/sniff/ | sudo - wireshark -k -i -` if you don't want to run Wireshark as root follow this - guide: https://gist.github.com/MinaMikhailcom/0825906230cbbe478faf4d08abe9d11a +3. In your local machine run: + ```bash + curl http://localhost:8080/sniff/ | sudo wireshark -k -i - + ``` + Again, for the sake of simplicity Wireshark is running as root. If you don't want + to run it this way follow this guide: + https://gist.github.com/MinaMikhailcom/0825906230cbbe478faf4d08abe9d11a 4. Profit!