Fix usage of sudo to prevent issues with the environment.

Also fix a couple of typos.
This commit is contained in:
pancho horrillo
2019-09-06 13:42:56 +02:00
parent 9c1b9b5bca
commit b577dd93d3
+8 -9
View File
@@ -1,16 +1,15 @@
Remote tcpdump sniffer with source filtering
============================================
1. Add any filter you want to the tcpdump command inside `tcpdump.pow` to filter
1. Add any filter you want to the `tcpdump` command inside `tcpdump.pow` to filter
any traffic you don't want to be sniffed!
2. For the sake of simplicity run `sudo kapow server tcpdump.pow`. In a
production environment tcpdump should be run with the appropiate permissions
but kapow can (and should) run as an unprivilieged user.
3. In your local machine run:
```bash
curl http://localhost:8080/sniff/<network-interface> | sudo wireshark -k -i -
2. For the sake of simplicity, run `sudo kapow server tcpdump.pow`. In a
production environment, `tcpdump` should be run with the appropiate permissions,
but kapow can (and should) run as an unprivileged user.
3. In your local machine run: ```bash
curl http://localhost:8080/sniff/<network-interface> | sudo -E wireshark -k -i -
```
Again, for the sake of simplicity Wireshark is running as root. If you don't want
to run it this way follow this guide:
Again, for the sake of simplicity, `Wireshark` is running as root. If you don't want
to run it this way, follow this guide:
https://gist.github.com/MinaMikhailcom/0825906230cbbe478faf4d08abe9d11a
4. Profit!