FMADIO Shark2

FMADIO FShark2 is a full Ubuntu desktop accessiable via RDP or HTTP client. This has the latest Wireshark binary plus additional utilis enabling full packet investigations on the system.

Port Forward Access

In many enviroments creating an additional IP for FShark2 is problematic. Instead port fowarding ports on the FMADIO Capture Appliance to the FShark2 device is a simpler apporach.

Step 1) Install FShark2 package

Download latest fshark2 release

curl -O https://firmware.fmad.io/download/container/fshark2-current.tar.gz .

Example

fmadio@fmadio100v2-228U:/mnt/store0/tmp2$ curl -O https://firmware.fmad.io/download/container/fshark2-current.tar.gz .
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 1292M  100 1292M    0     0  14.7M      0  0:01:27  0:01:27 --:--:-- 15.8M
fmadio@fmadio100v2-228U:/mnt/store0/tmp2$

Extract to LXC directory

sudo tar xfzv fshark2-current.tar.gz  -C /opt/fmadio/lxc/

Example output:

Or download an extract at the same time

Step 2) Configure LXC

Change directory to the /opt/fmadio/lxc/fshark2-<insert version>/

Run the install script. If no IP address for the container is used (e.g. fully NATed / port forward) leave the IP info blank

Example output

Step 3) Configure for NAT / Port forwarding

Comment out the lxc.net.1 (bridged interface) in the Config and set the default gateway to 192.168.255.2 (hosts internal interface)

Example Config

Step 4) AutoStart FSHARK2 on system boot

To enable automatic starting of the FSHAK2 container on system boot

Example output:

Step 5) Start the Container manually

To start the container

Example output

If it prints any messages it means there is a configuration error somewhere

Step 6) Confirm FSHAK2 is running

Check the port 3000 (HTTP browser) and 3389 (RDP) are open

Example output, can see both ports are listed

Step 6) Configure IP Port forwarding

Copy the following iptables to the configuration directory

Example output:

Manually load the iptables setting

Example output:

For reference the /opt/fmadio/etc_ro/iptables_fshark2_portfwd.conf file looks like the following

Step 7) Confirm IP Tables setting is correct

Output the iptables information

Example output:

Step 8) Confirm access

Point the browser to port 7000 or RDP to port 7001 to confirm FSHARK2 is accessible

FSHARK2 in Browser
FSHARK2 via RDP

Last updated

Was this helpful?