Stratoshark remote capture tutorial

Philippe Bogaerts
2 min readJan 22, 2025

--

Introduction

Today 22/jan/2025, Sysdig announced STRATOSHARK.

As they describe it:

“With Stratoshark, you can capture the activity of your Linux machine — including what happens inside containers — and analyze it using the same Wireshark UI you know and love. File I/O, command executions, network activity, interprocess communication? It’s all there. Whether you’re troubleshooting performance issues or investigating security events, Stratoshark provides everything you need in a single capture.”

A quick tutorial on how to remotely capture a trace

Using Stratoshark is as easy as using Wireshark, but let’s look at how we can obtain a remote trace from a Linux box on our Mac.

Open a few terminals on your local machine (in my case, a simple mac).
The idea is base on a previous article I wrote on remotely capturing TCPDUMP traces some time ago.

In Terminal_1

capture the dump of the trace (demo.scap)

nc -l 6666 >demo.scap

Terminal_2

SSH into the box where you want to obtain the trace and setup a reverse SSH tunnel. Once you have a shell, run the sysdig command.

ssh  ubuntu@x.x.x.x -R 6666:127.0.0.1:6666
sudo sysdig  --unbuffered -w - | nc 127.0.0.1 6666

Or with a filter

sudo sysdig "proc.name!=sshd and proc.name!=nc" --unbuffered -w - | nc 127.0.0.1 6666

Terminal_1

Once you want to terminate the capture, cancel nc (netcat) you can review the file locally (if sysdig is installed)

sysdig -r ./demo.scap

or open in Stratoshark (on Mac in my case)

/Applications/Stratoshark.app/Contents/MacOS/Stratoshark ./demo.scap

Voila !!

--

--

Philippe Bogaerts
Philippe Bogaerts

Written by Philippe Bogaerts

#BruCON co-founder, #OWASP supporter, Application Delivery and Web Application Security, #Kubernetes and #container, #pentesting enthousiast, BBQ & cocktails !!

No responses yet