Wireshark is popular tool for network protocol analysis used by education institutions and in the industry. It offers both terminal and graphical user interfaces and both are available on Fedora. You can use it either for real-time network analysis or to inspect files with captured traffic such as
For many years, the primary framework for the graphical user interface (GUI) used to be GTK, but since version 2.0, Qt became the framework of a choice. Nevertheless the old GUI is still available and you can choose which one you want to use.
How to install
In order to install the Wireshark GUI from repositories, simply type…
$ sudo dnf install wireshark-qt
…into a terminal. This will install both Qt and the CLI version of Wireshark. At this point, you can use Wireshark as root, but it is generally considered a bad practice. Therefore, we will set up permissions for regular users to capture on network interfaces (see below about security implications).
During installation, a system group called
was created. Users in this group can capture network traffic. All you need to do is to add your user account into the group like this, substituting your username for username:
$ sudo usermod -a -G wireshark username
Then log out and in again a you are ready to go!
How to capture packets with Wireshark
In order to start your first capture, select “Capture” in top menu, then pick one interface (e.g. loopback) or just tick the “Enable promiscuous mode on all interfaces” option and press the “Start” button. You should see network traffic now.
, which does the magic.
Discussion about security
does the magic of capturing network traffic. In order to do so, it needs to have certain privileges (specifically
for more information). That being said, dumpcap could possibly harm your network configuration and cause serious troubles, so be cautious with whom you give these capabilities (whom you place into the wireshark group).
Another thing to keep in mind when using Wireshark is that protocol dissectors tend to be buggy due to enormous amount of protocols and code needed to dissect them all. Take for instance the number of lines of code in C files only for dissectors:
$ cat epan/dissectors/*.c | wc -l 3178870
If you want to capture live traffic, it is better to use a simple capture utility (
) and dissect the traffic afterwards in a safe, isolated environment.
See what else Fedora offers
is not just about installation and updates! You can also use it to find out what else is provided in repositories. Use the
module to look for available packages and filter (with
) those starting with
, as these are sub-packages of the main Wireshark RPM package.
$ dnf search wireshark | grep '^wireshark' wireshark.x86_64 : Network traffic analyzer wireshark-qt.x86_64 : Wireshark's Qt-based GUI wireshark-gtk.x86_64 : Wireshark's GTK+-based GUI wireshark-debuginfo.x86_64 : Debug information for package wireshark wireshark-devel.i686 : Development headers and libraries for wireshark wireshark-devel.x86_64 : Development headers and libraries for wireshark wireshark-cli.x86_64 : Network traffic analyzer wireshark-cli.i686 : Network traffic analyzer
As you can see from the output, a GTK+-based GUI is also available.
Install multiple GUIs and switch between them
If you want to try the old GTK+ GUI, install it in a similar fashion as the previous one.
$ sudo dnf install wireshark-gtk
Now you need to use a tool called
to switch among them:
$ sudo alternatives --config wireshark There are 2 programs which provide 'wireshark'. Selection Command ----------------------------------------------- *+ 1 /usr/sbin/wireshark-qt 2 /usr/sbin/wireshark-gtk Enter to keep the current selection[+], or type selection number: 2
Now if you run Wireshark, e.g. from GNOME Shell, it will automatically start the GTK+ version. Anyway you can always just call
directly from a terminal.
Wireshark offers wide range of tools, filters, dissectors etc. You can read more about its capabilities in the official documentation.
As mentioned earlier, there is also a CLI version called
. It is useful if you need to run network analysis remotely, for instance over SSH. There is also
which can be used in a similar fashion, but that’s for another article!