Following on from this question, how can I tell tcpdump
to use a specific protocol analyzer for a particular port?
I'm doing some DNS development using a test server running on port 5053, but I can't figure out how to tell tcpdump
to pretend that this is really DNS traffic.
I can't use wireshark - the packets aren't passing past a machine that's got a GUI.
tshark, part of the Wireshark package, is text-only.
So,
tshark -d udp.port==5053,dns
should work.Interesting question. It seems that it should be accessible with the option:
Except that "domain" obviously isn't a valid option. I imagine that it's possible with a small amendment to the tcpdump source code, if you were that way inclined.
Update
Like so. Use at your own risk:
may not be explicitly helpful in answering your question, but you dont need a GUI to run wireshark.
X11 tunneled over SSH would allow you to run the full app remotely. It works well with either cygwin-x or openssh, depending on if you use windows or linux on your desktop.
edited: grawity is right, its not port forwarding.
Or you could put a GUI machine in between the two hosts and just do bridging between the two interfaces. I built myself a tiny computer for that very purpose, it's helped with debugging all kinds of installations where wireshark is not an option (ie. routers)