Name | wireshark-remote JSON |
Version |
0.1.2
JSON |
| download |
home_page | None |
Summary | Initiate wireshark remote capture (SSH or AVM FRITZ!Box) |
upload_time | 2025-08-04 20:05:34 |
maintainer | None |
docs_url | None |
author | None |
requires_python | >=3.9 |
license | None |
keywords |
ssh
wireshark
|
VCS |
 |
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
[](https://github.com/fetzerch/wireshark_remote/actions)
[](https://codecov.io/github/fetzerch/wireshark_remote)
[](https://pypi.org/project/wireshark_remote)
# wireshark_remote - Initiate wireshark remote capture (SSH or AVM FRITZ!Box)
This project provides the `wireshark-ssh` and `wireshark-fritzbox` wrapper
scripts that simplify executing Wireshark to remotely capture network traffic.
## Installation
*wireshark_remote* (and its dependencies) can be installed from PyPI with:
`python -m pip install wireshark_remote`
In addition the following programs need to be available an in `PATH`.
The corresponding packages have to be installed through your distro's package
manager.
`wireshark-ssh` requires on the host:
* wireshark
* ssh
and on the remote machine (besides having an SSH server running):
* tcpdump
* sudo (optional)
`wireshark-fritzbox` requires on the host:
* wireshark
* wget
## Usage
### `wireshark-ssh`
```sh
Usage: wireshark-ssh.py [OPTIONS] HOST [EXPRESSION]...
Launches wireshark locally and runs tcpdump on the remote [USER@]HOST via
SSH. An optional tcpdump filter EXPRESSION allows to prefilter the captured
packets.
Options:
-i, --interface TEXT The interface to capture from (default any).
-s, --sudo Run tcpdump via sudo.
--help Show this message and exit.
```
The following example shows how to remotely capture DNS network traffic on any
interface over SSH (tcpdump is executed with sudo on the remote host):
```sh
wireshark-ssh --sudo <user>@<host> port 53
```
### `wireshark-fritzbox`
```sh
Usage: wireshark-fritzbox.py [OPTIONS] [HOST]
Launches wireshark locally and captures from the AVM FRITZ!Box webinterface.
Options:
-i, --interface TEXT The interface to capture from (default 3-0).
-U, --username TEXT [required]
-P, --password TEXT [required]
--help Show this message and exit.
```
The following example shows how to remotely capture all network traffic on the
*Routing Interface* (3-0) of the AVM FRITZ!Box on `fritz.box`:
```sh
wireshark-fritzbox -U <username> -P <password>
```
## License
This projected is licensed under the terms of the MIT license.
Raw data
{
"_id": null,
"home_page": null,
"name": "wireshark-remote",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.9",
"maintainer_email": null,
"keywords": "ssh, wireshark",
"author": null,
"author_email": "Christian Fetzer <fetzer.ch@gmail.com>",
"download_url": "https://files.pythonhosted.org/packages/6e/9b/15d392f0154c37b99683ef259955e26bd267b3d265d5b5e1a7588f54b67b/wireshark_remote-0.1.2.tar.gz",
"platform": null,
"description": "[](https://github.com/fetzerch/wireshark_remote/actions)\n[](https://codecov.io/github/fetzerch/wireshark_remote)\n[](https://pypi.org/project/wireshark_remote)\n\n# wireshark_remote - Initiate wireshark remote capture (SSH or AVM FRITZ!Box)\n\nThis project provides the `wireshark-ssh` and `wireshark-fritzbox` wrapper\nscripts that simplify executing Wireshark to remotely capture network traffic.\n\n## Installation\n\n*wireshark_remote* (and its dependencies) can be installed from PyPI with:\n`python -m pip install wireshark_remote`\n\nIn addition the following programs need to be available an in `PATH`.\nThe corresponding packages have to be installed through your distro's package\nmanager.\n\n`wireshark-ssh` requires on the host:\n\n* wireshark\n* ssh\n\nand on the remote machine (besides having an SSH server running):\n\n* tcpdump\n* sudo (optional)\n\n`wireshark-fritzbox` requires on the host:\n\n* wireshark\n* wget\n\n## Usage\n\n### `wireshark-ssh`\n\n```sh\nUsage: wireshark-ssh.py [OPTIONS] HOST [EXPRESSION]...\n\n Launches wireshark locally and runs tcpdump on the remote [USER@]HOST via\n SSH. An optional tcpdump filter EXPRESSION allows to prefilter the captured\n packets.\n\nOptions:\n -i, --interface TEXT The interface to capture from (default any).\n -s, --sudo Run tcpdump via sudo.\n --help Show this message and exit.\n```\n\nThe following example shows how to remotely capture DNS network traffic on any\ninterface over SSH (tcpdump is executed with sudo on the remote host):\n\n```sh\nwireshark-ssh --sudo <user>@<host> port 53\n```\n\n### `wireshark-fritzbox`\n\n```sh\nUsage: wireshark-fritzbox.py [OPTIONS] [HOST]\n\n Launches wireshark locally and captures from the AVM FRITZ!Box webinterface.\n\nOptions:\n -i, --interface TEXT The interface to capture from (default 3-0).\n -U, --username TEXT [required]\n -P, --password TEXT [required]\n --help Show this message and exit.\n```\n\nThe following example shows how to remotely capture all network traffic on the\n*Routing Interface* (3-0) of the AVM FRITZ!Box on `fritz.box`:\n\n```sh\nwireshark-fritzbox -U <username> -P <password>\n```\n\n## License\n\nThis projected is licensed under the terms of the MIT license.\n",
"bugtrack_url": null,
"license": null,
"summary": "Initiate wireshark remote capture (SSH or AVM FRITZ!Box)",
"version": "0.1.2",
"project_urls": {
"Repository": "https://github.com/fetzerch/wireshark_remote"
},
"split_keywords": [
"ssh",
" wireshark"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "6f7a124f5c63cc2213f2ee3b65f1badfe2b745c3603c7e43f2093cd66f053234",
"md5": "9cefa4768c3364c0d5cb503a4a604d37",
"sha256": "d1cec2a24d82ec0e9f936786a93205263dfc741b4a27693c9f159a1920726689"
},
"downloads": -1,
"filename": "wireshark_remote-0.1.2-py3-none-any.whl",
"has_sig": false,
"md5_digest": "9cefa4768c3364c0d5cb503a4a604d37",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.9",
"size": 7176,
"upload_time": "2025-08-04T20:05:33",
"upload_time_iso_8601": "2025-08-04T20:05:33.450052Z",
"url": "https://files.pythonhosted.org/packages/6f/7a/124f5c63cc2213f2ee3b65f1badfe2b745c3603c7e43f2093cd66f053234/wireshark_remote-0.1.2-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "6e9b15d392f0154c37b99683ef259955e26bd267b3d265d5b5e1a7588f54b67b",
"md5": "c1c50f6620ee9ae854152cc9420d3683",
"sha256": "1570b21c0b341447d63566c4de22055136424e1273ce9db1eb74d681e42bfd5c"
},
"downloads": -1,
"filename": "wireshark_remote-0.1.2.tar.gz",
"has_sig": false,
"md5_digest": "c1c50f6620ee9ae854152cc9420d3683",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.9",
"size": 24152,
"upload_time": "2025-08-04T20:05:34",
"upload_time_iso_8601": "2025-08-04T20:05:34.481794Z",
"url": "https://files.pythonhosted.org/packages/6e/9b/15d392f0154c37b99683ef259955e26bd267b3d265d5b5e1a7588f54b67b/wireshark_remote-0.1.2.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-08-04 20:05:34",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "fetzerch",
"github_project": "wireshark_remote",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"tox": true,
"lcname": "wireshark-remote"
}