Fix usage of sudo to prevent issues with the environment.

Also fix a couple of typos.
This commit is contained in:
pancho horrillo
2019-09-06 13:42:56 +02:00
parent 9c1b9b5bca
commit b577dd93d3
+8 -9
View File
@@ -1,16 +1,15 @@
Remote tcpdump sniffer with source filtering Remote tcpdump sniffer with source filtering
============================================ ============================================
1. Add any filter you want to the tcpdump command inside `tcpdump.pow` to filter 1. Add any filter you want to the `tcpdump` command inside `tcpdump.pow` to filter
any traffic you don't want to be sniffed! any traffic you don't want to be sniffed!
2. For the sake of simplicity run `sudo kapow server tcpdump.pow`. In a 2. For the sake of simplicity, run `sudo kapow server tcpdump.pow`. In a
production environment tcpdump should be run with the appropiate permissions production environment, `tcpdump` should be run with the appropiate permissions,
but kapow can (and should) run as an unprivilieged user. but kapow can (and should) run as an unprivileged user.
3. In your local machine run: 3. In your local machine run: ```bash
```bash curl http://localhost:8080/sniff/<network-interface> | sudo -E wireshark -k -i -
curl http://localhost:8080/sniff/<network-interface> | sudo wireshark -k -i -
``` ```
Again, for the sake of simplicity Wireshark is running as root. If you don't want Again, for the sake of simplicity, `Wireshark` is running as root. If you don't want
to run it this way follow this guide: to run it this way, follow this guide:
https://gist.github.com/MinaMikhailcom/0825906230cbbe478faf4d08abe9d11a https://gist.github.com/MinaMikhailcom/0825906230cbbe478faf4d08abe9d11a
4. Profit! 4. Profit!