This guide shows how to set up Wireshark to remotely capture traffic via SSH using tcpdump.
Prerequisites
- Wireshark installed on your local machine.
- SSH access to the remote host:
- Regular SSH with
sudoprivileges, or
- Regular SSH with
- Remote host must have
tcpdumpinstalled.
Setup Wireshark with Remote SSH Capture
In Wireshark:
Go to:
Capture→Options→Manage InterfacesClick on the options icon next SSH Remote Capture
Set the interface details:
- Remote SSH Server Address:
ip-address of the server - Remote SSH Server port:
22
- Remote SSH Server Address:
In the Authentication tab fill in
- Remote SSH Server Username
- Remote SSH Server Password
In the Capture tab specify the Remote Capture Command. For example:
BASH1sudo /usr/sbin/tcpdump -U -i eth0 -w - not port 22This captures traffic from
eth0while excluding SSH (port 22).Tip To exclude more ports, simply add filters like
not port 41641. Repeat this for each port you want to omit from the capture.Save and Start the capture.
Notes
- Replace
eth0with the correct physical interface.
You’re now ready to securely and cleanly capture packets from a remote system using Wireshark — even with Tailscale!
