Stream 802.11 frames encapsulated in TaZmen Sniffer Protocol (TZSP) over UDP to a remote host.
Tested with Wireshark Version 4.4.1, it should work with older versions with the TZSP dissector.
- Make sure the destination port matches the TZSP port configured in
Edit > Preferences > Protocols > TZSP
. - Make sure TZSP is enabled under
Analyze > Enabled Protocols
.
- Start a capture on the network interface with the destination IP.
- Use the display filter
tzsp
to only show streamed frames.
- Columns with dynamic fields (Source, Destination, etc.) will show local IP, or other matching fields, therefore it may be useful to create a custom Configuration Profile in Wireshark with more specific columns (e.g.,
wlan.sa
field for Source).
- Stream Ethernet packets (add a CLI switch)
- Improve CLI output to include statistics
- Include a service file and process mode
Initial code idea came from Nick vs Networking's Scratch'n'Sniff project.