I've been using wireshark to monitor a remote interface on a pc that is having an intermittent problem that we believe to be network related. The problem is, wireshark crashes on my win7 machine every 15 minutes or so after consuming more than a gig of RAM. I read that wireshark actually uses dumpcap to retrieve the packet info from winpcap. Unfortunately, to my knowledge, the documentation for dumpcap doesn't explain how to use dumpcap in this manner. So I viewed the dumpcap using ProcessThreadsView to see how wireshark was accomplishing this. What i found is that it was using several undocumented switches to get the info from the remote interface and then relay that back to wireshark. Here are the steps I took to make this work.
"C:\Program Files\Wireshark\dumpcap" -n -i rpcap://[10.0.0.xxx]/\Device\NPF_{8ED1D2B6-2FB7-41F7-A211-75D29414FFFF} -f "not tcp port 3389" -A username:password -w C:\Sniff\sniff_log Note that in the documentation for dumpcap there is no mention of the -A switch to specify the UN/PW which will be necessary if your winpcap requires authorization. Happy sniffing! asked 18 Jul '12, 11:57 eyancey edited 19 Jul '12, 10:37 Kurt Knochner ♦ |