![]() All enabled repositories share the same priority. Repository priorities are without effect. Again, this command can be shortened to "zypper rm htop". The above " remove" option removes the specified package. The following package is going to be REMOVED:Īfter the operation, 296.0 KiB will be freed. Removing Packages: zypper remove packagename You can use the shortened version of the same command "zypper in htop". The package "htop" has been installed by specifying the " install" option. ![]() The following NEW package is going to be installed: Installing Packages: zypper install packagename #SLES INSTALL WIRESHARK ZYPPER SOFTWARE#zypper is used for installing, removing, updating and querying software packages. zypper is predominantly found on SLES (SUSE Linux Enterprise Server) and openSUSE distributions. Note: This was tested working in openSUSE 13.1.Zypper is a command line interface to the native ZYpp package manager. Now when you start Wireshark as a regular (non-root) user you’ll be able to capture packets without providing root credentials. Logout and login again to finalize the addition of your user to the wireshark group. View the capabilities of dumpcap to confirm they were set correctly: getcap /usr/bin/dumpcap /usr/bin/dumpcap = cap_net_admin,cap_net_raw+eip Set the capabilities required by dumpcap to run since its group is no longer root: sudo setcap cap_net_raw,cap_net_admin=eip /usr/bin/dumpcap Install setcap to set the capabilities of /usr/bin/dumpcap: sudo zypper install libcap-progsĬreate a new group wireshark to restrict users who can use Wireshark to capture packets: sudo groupadd wiresharkĪdd your user to the wireshark group to be able to capture packets: sudo usermod -a -G wireshark cguserĬhange the group of dumpcap to wireshark: sudo chgrp wireshark /usr/bin/dumpcapĬhange the permissions of dumpcap to only allow users in wireshark group to be able to run it: sudo chmod o-rwx /usr/bin/dumpcap ![]() This portion was taken from Sniffing with Wireshark as a Non-Root User. Run Wireshark as non-root user to capture packets Now when you start Wireshark as a regular (non-root) user you’ll be able to display packets without providing root credentials. You’ll have to do this for all non-root users who need to run Wireshark. The one change we make is to execute Wireshark as a regular user and not as root. In the command above we are creating a copy of /usr/share/applications/sktop and saving it to /home/cguser/.local/share/applications/sktop. ![]() There’s a simple workaround to this by creating a local sktop file, copied from /usr/share/applications/sktop, with a slight modification.Ĭat /usr/share/applications/sktop | sed -e 's!Exec=/usr/bin/xdg-su -c /usr/bin/wireshark %f!Exec=/usr/bin/wireshark %f!g' > /home/cguser/.local/share/applications/sktop There is one caveat to running Wireshark in openSUSE as non-root user: when you run Wireshark from the GUI (say GNOME Shell) you are prompted to enter the root password. Install Wireshark: sudo zypper install wireshark Run Wireshark as non-root user to view captures If you don’t have root privileges or want to capture packets as your regular user then you need a few extra steps. However, to capture packets you need root privileges. You also don’t need to do anything extra other than installing it. ![]() To display packets or view pcap files you don’t need to run Wireshark as root. There are two aspects of using Wireshark in openSUSE: capturing packets and displaying packets. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |