NAME
extcap - The extcap interfaceDESCRIPTION
The extcap interface is a versatile plugin interface that allows external binaries to act as capture interfaces directly in Wireshark. It is used in scenarios, where the source of the capture is not a traditional capture model (live capture from an interface, from a pipe, from a file, etc). The typical example is connecting esoteric hardware of some kind to the main Wireshark application.the-esoteric-binary --the-strange-flag --interface=stream1 --file dumpfile.pcap & wireshark dumpfile.pcap
GRAMMAR ELEMENTS
Grammar elements:argument for CLI calling
Reference # of argument for other values,
display order
Literal argument to call (--call=...)
Displayed name
Default value, in proper form for type
Range of valid values for UI checking
(min,max) in proper form
integer unsigned long (may include scientific / special notation) double string (display a textbox) selector (display selector table, all values as strings) boolean (display checkbox) booleanflag (display checkbox) radio (display group of radio buttons with provided values, all values as strings) fileselect (display a dialog to select a file from the filesystem, value as string) multicheck (display a textbox for selecting multiple options, values as strings) password (display a textbox with masked text) timestamp (display a calendar)
Values for argument selection arg Argument # this value applies to
EXAMPLES
Example 1:arg {number=0}{call=--channel}{display=Wi-Fi Channel}{type=integer}{required=true} arg {number=1}{call=--chanflags}{display=Channel Flags}{type=radio} arg {number=2}{call=--interface}{display=Interface}{type=selector} value {arg=0}{range=1,11} value {arg=1}{value=ht40p}{display=HT40+} value {arg=1}{value=ht40m}{display=HT40-} value {arg=1}{value=ht20}{display=HT20} value {arg=2}{value=wlan0}{display=wlan0}
arg {number=0}{call=--usbdevice}{USB Device}{type=selector} value {arg=0}{call=/dev/sysfs/usb/foo/123}{display=Ubertooth One sn 1234} value {arg=0}{call=/dev/sysfs/usb/foo/456}{display=Ubertooth One sn 8901}
arg {number=0}{call=--usbdevice}{USB Device}{type=selector} arg {number=1}{call=--server}{display=IP address for log server}{type=string}{validation=(?:\d{1,3}\.){3}\d{1,3}} flag {failure=Permission denied opening Ubertooth device}
arg {number=0}{call=--username}{display=Username}{type=string} arg {number=1}{call=--password}{display=Password}{type=password}
arg {number=0}{call=--start}{display=Start Time}{type=timestamp} arg {number=1}{call=--end}{display=End Time}{type=timestamp}
SECURITY CONSIDERATIONS
•If you’re running Wireshark as
root, we can’t save you.
•Dumpcap retains suid/setgid and group
execute permissions for users in the “wireshark” group
only.
•Third-party capture programs run with
whatever privileges they’re installed with.
•If an attacker can write to a system
binary directory, it’s game over.
•You can find your local extcap
directory in About › Folders.
SEE ALSO
wireshark(1), tshark(1), dumpcap(1), androiddump(1), sshdump(1), randpktdump(1)NOTES
Extcap is feature of Wireshark. The latest version of Wireshark can be found at <https://www.wireshark.org>.2023-11-17 |