[TOSS Conf 2023 Offline] Wireshark,tshark,nmap - journey

With much more analysis on wireshark application, found that there is an option to sniff the packets on remote-host from Open-source tool wireshark application itself. from capture->manage interfaces->remote-interface ( This is feature was not available at older versions with which i learnt 3.2.3 over which supporting libraries was not installed)
According to wireshark documentation, the remote interface support was provided to Wireshark since version 1.0.0, which was released on June 15, 2008. However, this feature requires WinPcap or Npcap on Windows, or libpcap on Linux and other Unix-like systems.

To extensively use RPCAP ( remote protocol packet capture) on Cloud server and remote packet captures- rpcapd and libpcap libraries can be used to understand the extensively through studying the libpcap concepts for requirement based capturing packets from - Home | TCPDUMP & LIBPCAP
For requirement of automated way of capturing the packet for analysis and filtering - python package named pyshark can be used along with IPC mechanisms support.

Requirement to try automating of packet capturing to interleave captured packet to server to get logged:
[How to Transfer Files in the Network using Sockets in Python - Python Code]
[An Intro to Threading in Python – Real Python]

Incase found browsing of code is huge, you can try an alternate option : Python 3.8 based Network Packet Sniffer : “EONRaider” from Github - to start easily and work. Challenge is that library module :
Incase- if anyone interested - Please try and share your results.
Traceback (most recent call last):
File “sniffer.py”, line 3, in
from core import PacketSniffer
File “/home/box/WS-using-NETprotocol-lib/Packet-Sniffer/packet_sniffer/core.py”, line 10, in
import netprotocols
ModuleNotFoundError: No module named ‘netprotocols’