promiscuous mode wireshark. In my test environment there are 3 (protected) networks but when sniffing in promiscuous mode no packets are shown. promiscuous mode wireshark

 
 In my test environment there are 3 (protected) networks but when sniffing in promiscuous mode no packets are shownpromiscuous mode wireshark Here are the tests I run, and the results, analyzing all interfaces in wireshark, promiscuous mode turned off: ping a website from the windows cli, the protocol shows as ICMPv6, and the source IP in wireshark shows up as the windows temporary IPv6

0: failed to to set hardware filter to promiscuous mode) that points to a npcap issue: 628: failed to set hardware filter to promiscuous mode with Windows 11 related to Windows drivers with Windows 11. Navigate to the environment you want to edit. Here are the tests I run, and the results, analyzing all interfaces in wireshark, promiscuous mode turned off: ping a website from the windows cli, the protocol shows as ICMPv6, and the source IP in wireshark shows up as the windows temporary IPv6. 5 today. 11 ESS operation assumes that, in a BSS, all non-AP stations must send all their packets to the AP, regardless of the destination address. 1. TIL some broadcast addresses, and a little about Dropbox's own protocol. 2 running on a laptop capturing packets in promiscuous mode on the wireless interface. In promiscuous mode, Wireshark examines each packet it encounters as it passes across the interface. 168. You can disable promiscuous mode for that interface in the menu item Capture -> Capture Options. Promiscuous mode or promisc mode is a feature that makes the ethernet card pass all traffic it received to the kernel. To see packets from other computers, you need to run with sudo. Promiscuous mode. Share. There are other protocols that can be used, too, like QUIC, or flowing over a VPN tunnel which would then hide the traffic, by design, from simple filters. 11 link layer header type frames. Asked: 2021-06-14 20:25:25 +0000 Seen: 312 times Last updated: Jun 14 '21Furthermore, Hyper-V does not let you simply set a “promiscuous mode” flag on a port, as you need to specify if a given port is supposed to be the source or the destination of the network packets, “mirroring” the traffic, hence the name. The promiscuous mode enables you to see the network traffic through the Wireshark. It's on 192. Please check that "DeviceNPF_{84472BAF-E641-4B77-B97B-868C6E113A6F}" is the proper interface. 0. If it does, you should ask whoever supplied the driver for the interface (the vendor, or the supplier of the OS you’re running on your machine) whether it supports promiscuous mode with that network interface. Please provide "Wireshark: Help -> About. Monitor mode also cannot be. 11 plus radiotap header. asked 08 May '15, 11:15. Rebooting PC. Does Promiscuous mode add any value in switch environment ? Only if the switch supports what some switch vendors call "mirror ports" or "SPAN ports", meaning that you can configure them to attempt to send a copy of all packets going through the switch to that port. org. Enter a filename in the "Save As:" field and select a folder to save captures to. If your network is "protected", meaning it's using WEP or WPA/WPA2, and encrypting packets, you would have to follow the instructions in the Wireshark Wiki page on decrypting 802. Promiscuous mode doesn't work on Wi-Fi interfaces. 1. e. Save the packet trace in the default format. Multiple feedbacks seem to suggest that monitor mode doesn't work with newer Mac with Mojave or Catalina. e. Is that it? No, you also need to enable monitor mode - which, on Windows, is, as sindy has noted, only possible with Windows Vista and later with recent versions of NPcap (it advertises support for Windows 7 and later, but. To enable promiscuous mode for the VIF, run the following command on the XenServer host: xe vif-param-set uuid=<uuid_of_vif> other-config:promiscuous="true" Where <uuid_of_vif> is the UUID for the VIF copied from Step 1. Confirmed with Wireshark 2. Setting the default interface to the onboard network adaptor. I see every bit of traffic on the network (not just broadcasts and stuff to . ) sudo chgrp wireshark /usr/sbin/dumpcap. 2 and I'm surfing the net with my smartphone (so, I'm generating traffic). 1. Promiscuous ModeI am try to capture the HTTP traffic from local server to remote server, but i cannot install directly wireshark on the machine because company's policy dont permit. When this mode is deactivated, you lose transparency over your network and only develop a limited snapshot of. 10 is enp1s0 -- with which 192. ”. Use System. 1 Answer. 11 protocol and when I try to decrypt using wpa-pwd it says invalid key format. Wireshark includes filters, color coding, and other features that let you dig deep into network traffic and inspect individual packets. 1 GTK Crash on long run. No CMAKE_C(XX)_COMPILER could be found. Promiscuous mode is usually supported and enabled by default. 0. See. 0. In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique. txt. a_p_. • Use dumpcap not tshark or Wireshark • Care needed when teaming used • Intra-OS tracing not possible on Windows - Loopback adapter not the same as Linux. As the article, only set MonitorMode=2 as work as promiscuous Mode? hypervPromiscuousModeSetUp Here says that set MonitorMode=2 and also set physical mac address on host computer to do port mirroring. 0. If I switch to monitor mode with promiscuous mode still enabled all I get is 802. Promiscuous Mode: Considerations • vAnalyser VM required • Care regarding destination of trace data - Not to sensitive volumesOriginally, the only way to enable promiscuous mode on Linux was to turn on the IFF_PROMISC flag on the interface; that flag showed up in the output of command such as ifconfig. All you need to do is to add your user account into the group like this, substituting your username for username: $ sudo usermod -a -G wireshark username. Certain applications, such as network diagnostic or performance monitoring tools, might require visibility into the entire traffic passing across the PIF to. In order to capture TokenRing traffic other than Unicast traffic to and from the host on which you're running Wireshark, Multicast traffic, and Broadcast traffic, the adapter will have to be put into promiscuous mode, so that the filter mentioned above is switched off and all packets received are delivered to the host. Thirdly, even with monitor mode or promiscuous mode, before able to see all traffic is not the same as using ARP spoofing. You can set an explicit. Promiscuous mode monitors all traffic on the network, if it's not on it only monitors packets between the router and the device that is running wireshark. But remember: To capture any packets, you need to have proper permissions on your computer to put Wireshark into promiscuous mode. Promiscuous mode (enabled by default) allows you to. There are two Wireshark capturing modes: promiscuous and monitor. answered 17 Mar '14,. 5). To activate promiscuous mode, click on the Capture Options dialog box and click. From Wireshark's main screen, I select both, ensure "promiscuous mode" is checked under options, and then begin capturing packets. Next to Promiscuous mode, select Enabled. Debug Proxy is another Wireshark alternative for Android that’s a dedicated traffic sniffer. To configure a monitoring (sniffer) interface on Wireshark, observe the following instructions: Click on Capture | Options to display all network interfaces on the local machine: Select the appropriate network interface, select Enable promiscuous mode on all interfaces, and then click Start to begin capturing network packets: The Packet List. Restrict Wireshark delivery with default-filter. Promiscuous mode is a network interface controller (NIC) mode that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is intended to receive. Select the shark fin on the left side of the Wireshark toolbar, press Ctrl+E, or double-click the network. Next to Promiscuous mode, select Enabled. A user asks why Wireshark does not capture packets from other devices on their home Wi-Fi network, and how to enable promiscuous mode on their adapter. Mode is disabled, leave everything else on default. 10. The flow of data runs serial, so that the data are sent in bits strung together. I use this to capture the IP traffic (e. Add Answer. However, Wireshark includes Airpcap support, a special -and costly- set of WiFi hardware that supports WiFi traffic monitoring in monitor mode. Capture packets of the wire using the WinPcap/Npcap library. Theoretically, when I start a capture in promiscuous mode, Wireshark should display all the packets from the network to which I am connected, especially since that network is not encrypted. When this mode is turned off, your network is less transparent, and you only get a restricted snapshot of it (this makes it more difficult to conduct any analysis). For example, if I run Wireshark and then surf the web on Firefox, packets are captured. In computer networking, promiscuous mode is a mode of operation, as well as a security, monitoring and administration technique. Once the problem which is to be analyzed has been reproduced, click on Stop. TShark Config profile - Configuration Profile "x" does not exist. Determine the MAC address of your capture card, and set a capture filter: "not ether host xx:xx:xx:xx:xx:xx". e. wireshark promiscuous mode. This data stream is then encrypted; to see HTTP, you would have to decrypt first. See the "Switched Ethernet" section of the "CaptureSetup/Ethernet. (03 Mar '11, 23:20) Guy Harris ♦♦. tshark, at least with only the -p option, doesn't show MAC addresses. A question in the Wireshark FAQ and an item in the CaptureSetup/WLAN page in the Wireshark Wiki both mention this. However, it doesn’t really matter because the primary benefit of promiscuous mode is to capture traffic not destined for the computer. TShark -D and all NICs were listed again. I want to turn promiscuous mode on/off manually to view packets being sent to my PC. Click Save. 168. answered 04 Jun '15, 17:14. Use WMI Code Creator to experiment and arrive at the correct C# code. 3 Answers: 1. You can also check Enable promiscuous mode on all interfaces, as shown in the lower left-hand corner of the preceding screenshot. How do I get and display packet data information at a specific byte from the first byte? Launch Wireshark once it is downloaded and installed. There may be some WSL2 possibilities for you, depending on your. ARP spoofing involves traffic being injected into the network to do the spoofing, which monitor/promiscuous mode by itself doesn't. – Hans Passant. Wireshark allows the user to put network interface controllers that support promiscuous mode into that mode, in order to see all traffic visible on that interface, not just traffic addressed to one of the interface's configured addresses and broadcast/multicast traffic. Some tools that use promiscuous mode - Wireshark, Tcpdump, Aircrack-ng, cain and abel, Snort, VirtualBox…To enable promiscuous mode for the VIF, run the following command on the XenServer host: xe vif-param-set uuid=<uuid_of_vif> other-config:promiscuous="true" Where <uuid_of_vif> is the UUID for the VIF copied from Step 1. 0. It is usually caused by an interference between security software drivers and WinPcap. 1. The promiscuous mode can easily be activated by clicking on the capture options provided in the dialog box. asked 08 May '15, 11:15. This makes it possible to be completely invisible, and to sniff packets on a network you don't have the password for. However, I couldn't find any information about aggregated packet, like the one. Note that, unless your network is an "open" network with no password (which would mean that other people could see your. and capture in promiscuous mode, you see. By default, Wireshark lets you capture packets going to and from the computer you’re using. 3 All hosts are running Linux. l219-LM using wireshark or NI observer same results nic is not in promiscuous mode OS Windows 10. Click Properties of the virtual switch for which you want to enable promiscuous mode. Here is a link that gives a lot more information: High on Wires: Difference - Promiscuous vs. Spent hours to try to fix it with no luck. If I turn promiscuous mode off on the Intel NICs, then pings work fine while wireshark is capturing. promiscousmode. client and server) using a single client. Next, verify promiscuous mode is enabled. Mode is enabled and Mon. 2. Please check to make sure you have sufficient permissions, and. I'm not. Shift+→. 2. Ctrl+ ↑ Or F7. 1 Answer Sort by » oldest newest most voted 1 answered Nov 25 '0 Guy Harris 19835 3 612 207 Does Promiscuous mode add any value in switch environment ?Hello, Wireshark 4. Hence, -p cannot be used to ensure that the only traffic that is captured is traffic sent to or from the machine on which Wireshark is running, broadcast traffic, and multicast traffic to addresses received by that machine. Launch Wireshark once it is downloaded and installed. This mode reads and records. 0. 一般计算机网卡都工作在非混杂模式下,此时网卡只接受来自网络端口的目的地址指向自己的数据。. When capturing with a Windows machine. 168. Some protocols like FTP and Telnet transfer data and passwords in clear text, without encryption, and network scanners can see this data. Right-click on it. Click Properties of the virtual switch for which you want to enable promiscuous mode. 37 continuously on a Linux box, then I use wireshark in promiscuous mode on my Mac to see if it can see the packets, but no good. 168. Wireshark puts the network interface in "promiscuous" mode, as do most other packet capture tools. Now start a web browser and open a webpage like ‘ ’. Using Wireshark, the capture interface options shows that you could capture Ethernet packets with or. Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:_____We're getting promiscuous, with wirele. I went to Edit / Preferences / User. Below is a short list of what Wireshark supports on what platforms. 0. • WEP and WPA1/2 personal mode (shared key) can be decrypted by Wireshark • To enable WPA decryption, the key negotiation process must be captured too • Shared Key decryptions is possible during capturing or offline from a stored fileExactly same issue for me. (Run the groups command to verify that you are part of the wireshark group. 192. Launch Wireshark once it is downloaded and installed. Если рассматривать promiscuous mode в. What I was failing to do was allow Wireshark to capture the 4 steps of the WPA handshake. A tool to enable monitor mode;. 0. To check if promiscuous mode is enabled click Edit > Preferences, then go to Capture. Run the following command to verify that the promiscuous option has been set: xe vif-param-list uuid=<uuid_of_vif> How to activate promiscous mode. If you're on a protected network, the. If you want to practice capturing network traffic with Wireshark, you can use “sample captures,” which show you another network’s packet data. Next, verify promiscuous mode is enabled. This option will allow packets to be captured continuously without filling up the storage on. Use ESP32 promiscuous mode to capture frame and send them over serial connection to a Python script that writes a PCAP file and start Wireshark with live capture. In Infrastructure/ESS mode, it doesn't make much sense to capture packets going to other stations in promiscuous mode, for several reasons : The 802. Wireshark promiscuous mode. In the 2. 168. I'm using a virtual machine with WireShark monitoring a bridged virtual network interface. link layer header type: 802. 0. Capture packets in promiscuous mode. This means that the. There is a setting in the Wireshark capture options that should always have a check mark. 0. 100. Wireshark works roughly the same way. A user asks why Wireshark does not capture packets from other devices on their home Wi-Fi network, and how to enable promiscuous mode on their adapter. This checkbox allows you to specify that Wireshark should put the interface in promiscuous mode when capturing. 168. I connect computer B to the same wifi network. " Under Protocols, select "IEEE 802. The capture session could not be initiated on interface 'DeviceNPF_{B8EE279C-717B-4F93-938A-8B996CDBED3F}' (failed to set hardware filter to promiscuous mode). Uncheck promiscuous. Even in promiscuous mode, an 802. As you note, the instructor is mistaken, and should read the Wireshark Wiki article in question ("and the novice was enlightened"). Wireshark will try to put the interface on which it's capturing into promiscuous mode unless the "Capture packets in promiscuous mode" option is turned off in the "Capture Options" dialog box, and TShark will try to put the interface on which it's capturing into promiscuous mode unless the -p option was specified. In the current version (4. Promiscuous mode is a security policy which can be defined at the virtual switch or portgroup level in vSphere ESX/ESXi. That mode is called “Promiscuous Mode”, and Wireshark does it automatically by default: Promiscuous Mode Setting for Network Interfaces By the way, if you’re capturing on a wireless card, you’ll also need something called “ Monitor Mode ” enabled as well, or you’ll not see packets with their radio information. On Linux you use a PF_PACKET socket to read data from a raw device, such as an ethernet interface running in promiscuous mode: s = socket (PF_PACKET, SOCK_RAW, htons (ETH_P_ALL)) This will send copies of every packet received up to your socket. Here’s the process. 8, doubleclick the en1 interface to bring up the necessary dialog box. I am trying to run Kali on the MAC and capture all packets between the VMs. Or, go to the Wireshark toolbar and select the red Stop button that's located next to the shark fin. {CC3F3B57-6D66-4103-8AAF-828D090B1BA9}' (failed to set hardware filter to non-promiscuous mode). Switches are smart enough to "learn" which computers are on which ports, and route traffic only to where it needs to go. But again: The most common use cases for Wireshark - that is: when you. And do not forget setting the Link Layer to Per Packet Info. The network adapter is now set for promiscuous mode. When monitor mode is enabled you would see all Wifi frames, also those not carrying pure Ethernet MAC frames and therefore you get 802. Launch Wireshark once it is downloaded and installed. Monitor mode can be completely passive. The npcap capture libraries (instead of WinPCAP). The Hyper-V PowerShell module does a great job in making life easy from this perspective, for example:Taking Packet Captures. How to activate promiscous mode. sudo chmod o-rx /usr/sbin/dumpcap (Changing the group will clear file. ARP Test - When in promiscuous mode the driver for the network card checks for the MAC address being that of the network card for unicast packets, but only checks the first octet of the MAC address against the value 0xff to determine if the packet is broadcast or not. 0. (failed to set hardware filter to promiscuous mode: A device attached to the system is not functioning. Restart the pc. To stop capturing, press Ctrl+E. Promiscuous mode. Run wireshark, press Capture Options, check wlan0, check that Prom. Switches learn MAC addresses, and will thus, be able to determine out of which port they will forward packets. Capture is mostly limited by Winpcap and not by Wireshark. Newer Wireshark versions are able to handle up to 256 associations and should be able to decode any packets all the time. In "NAT" mode, each VM is behind a virtual router that performs IP address translation in pretty much the same way home routers/gateways with NAT do – as a side effect it rejects any incoming packets unless they belong to a. 2 Answers: 0. You can configure Wireshark to color your packets in the Packet List according to the display filter, which allows you to emphasize the packets you want to highlight. 804. My understanding so far of promiscuous mode is as follows: I set my wireless interface on computer A to promiscuous mode. answered Feb 20 '0. winpcap D. 11 adapters, but often does not work in practice; if you specify promiscuous mode, the attempt to enable promiscuous mode may fail, the adapter might only capture traffic to and from your machine, or the adapter might not capture any packets. To check if promiscuous mode is enabled click Edit > Preferences, then go to Capture. Solution 1 - Promiscuous mode : I want to sniff only one network at a time,. Cannot capture non-local packets on MacOS. 4. Without promisc mode only packets that are directed to the machine are collected, others are discarded by the network card. 11. 100. When you start wireshark you see in the middle of the window a scrollable list of interfaces eth0, wlan0 etc. When I start wireshark I go to capture on the tool bar, then interfaces. 0. 168. If you have trouble getting WireShark working with existing client cards, then consider purchasing AirPcap, which is a USB-based 802. 自動的にスクロールさせて、最新のキャプチャパケットをリアルタイムに表示させる. Don't put the interface into promiscuous mode. Q1 - What does promiscuous mode mean? . 最近在使用Wireshark进行抓包排错时,选择网卡后提示报错,在此之前从未出现过,报错内容如下:. Click on Edit > Preferences > Capture and you'll see the preference "Capture packets in promiscuous mode". addr") and. Select File > Save As or choose an Export option to record the capture. When I startup Wireshark (with promiscuous mode on). captureerrorOne Answer: 1. g. ie: the first time the devices come up. This article is one in a series of articles describing the deployment path for OT monitoring with Microsoft Defender for IoT. In promiscuous mode you have to associate with the AP, so your're sending out packets. . See the page for Ethernet capture setup in the Wireshark Wiki for information on capturing on switched Ethernets. After starting Wireshark, do the following: Select Capture | Interfaces. In computer networking, promiscuous mode is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller. Normally, your NIC would only. 11ac standards with bandwidths of 20,40,80 and 160MHz in 2. 200, another host, is the SSH client. Improve this answer. 8 from my. 100. Promiscuous mode (enabled by default) allows you to see all other packets on the network instead of only packets addressed to your network adapter. The data, or here also data packets, are transferred via a network cable. In the driver properties you can set the startup type as well as start and stop the driver manually. It is not, but the difference is not easy to spot. The snapshot length, or the number of bytes to capture for each packet. Promiscuous mode operation allows an interface to capture packets that are sent to any MAC address. You are in monitor and promiscuous mode, so could you share the following output so I can figure out why I can't get mine to do promisc mode:. For the network adapter you want to edit, click Edit Network Adapter. The 82579LM chipset supports promiscuous mode so there's no reason it shouldn't support sniffing on arbitrary data as long as your driver supports it. Via loopback App Server Database Server. Promiscuous mode allows the interface to receive all packets that it sees whether they are addressed to the interface or not. Just like Packet Capture, it can capture traffic, monitor all your HTTP and HTTPS traffic, decrypt SSL traffic using MITM technique and view live traffic. 11 radio designed to work effectively. g. , a long time ago), a second mechanism was added; that mechanism does not set the IFF_PROMISC flag, so the interface being in promiscuous. I am studying some network security and have two questions: The WinPCap library that Wireshark (for Windows) is using requires that the network card can be set into promiscuous mode to be able to capture all packets "in the air". His or her instructor probably thinks enabling promiscuous mode is sufficient. 6. 4. Analizing traffic with Wireshark on the VM2 I've noticed that an ARP request leaves from the remote client MAC to the destination host interface of VM2 (broadcast ARP request). To get the radio layer information, you need at least three things (other than Wireshark, of course): A WiFi card that supports monitor mode. Computer Science questions and answers. Promiscuous mode (enabled by default) allows you to see all other packets on the network instead of only packets addressed to your network adapter. Move to the next packet, even if the packet list isn't focused. Wireshark 2. 8) it is stored in preferences and the state is saved when exiting and set upon re-entering the gui. Click Settings to open the VM Settings page. This is because the driver for the interface does not support promiscuous mode. Wireshark will put your network interface card in promiscuous mode once you start capturing packets. link. The network adapter is now set for promiscuous mode. Luckily, Wireshark does a fantastic job with display filters. Understanding promiscuous mode. Navigate to the environment you want to edit. 1. 3) The promiscuous mode allows NIC to pass only traffic that belongs to the host machine. Or there is wheel button - configure capture - which will pop up a window where you can choose the interface and press start. Below is a packet sniffing sample between two different machines on the same network using Comm View. encrypted, Wi-Fi network. Select the interface on which packets need to be captured. The capture session could not be initiated (failed to set hardware filter to promiscuous mode) Try using the Capture -> Options menu item, selecting the interface on which you want to capture, turn off promiscuous mode, and start capturing. This is likely not a software problem. Wireshark is a network “sniffer” - a tool that captures and analyzes packets off the wire. I know I am! This should go without saying, be responsible in what you do. Intel® Gigabit Network Adapter. Trying to do some sniffing with wireshark in promiscuous mode but not having any luck. 0. 17. I tried the above code but it is not working it return promiscuous mode false although i have enabled it using wireshark. In such a case it’s usually not enough to enable promiscuous mode on your own NIC, but you must ensure that you’re connected to a common switch with the devices on which you want to eavesdrop, and the switch must also allow promiscuous mode or port mirroring. Launch Wireshark once it is downloaded and installed. 11 datagram packets: checked. If you’ve never used Wireshark with promiscuous mode enabled, I highly recommend it – if you’re into geeky things that is. If you do not specify this, Wireshark will only capture the packets going to or from your computer (not all packets on your LAN segment). assuming you're running Windows: if you do not need to communicate on the capture card you could just remove. Here's an example. I write a program to send multicast packets to 225. 1. switch promiscuous-mode mode wireshark. However, most Ethernet networks are switched, and, on a. you have disabled promiscuous mode on the capture card, which would mean that the card will only accept frames that contain the card's MAC address (or are Broadcast/Multicast) - there is a. Capturing in promiscuous mode. Prepare Wireshark recording. chmod g+rw /dev/vmnet0. In such a case it’s usually not enough to enable promiscuous mode on your own NIC, but you must ensure that you’re connected to a common switch with the. This means the NIC will forward all frames to the OS. So, there is no problem, other than than some annoying libpcap issues that prevent you from selecting monitor mode from within Wireshark (by using the checkbox) rather than having to use airmon-ng. Click on the blue icon at the top left bar or double click the interface name to start the capture. 3. Your network adapter must be. So yes, you should see traffic from the mirror port. Two answers explain that Wireshark does not need promiscuous mode for WiFi capture, and suggest using npcap driver and monitor mode for Windows. Users in this group can capture network traffic. As far as I understand, this is called promiscuous mode, but it does not seem to work with my adapter (internal wifi card or. In setting up Wireshark, what driver and library are required to allow the NIC to work in promiscuous mode? A. ) sudo chgrp wireshark /usr/sbin/dumpcap. You're likely using the wrong hardware. 当网卡工作在. Open capture dialog. dll). Another option is two APs with a wired link in between. (31)) please turn of promiscuous mode on your device. Next, verify promiscuous mode is enabled. 200, another host, is the SSH client. As the Wireshark Wiki page on decrypting 802. A virtual machine, Service Console or VMkernel network interface in a portgroup which allows use of promiscuous mode can see all network traffic traversing the virtual switch. Wireshark can start a new capture file every day. 0, but it doesn't! :( tsk Then, I tried promiscuous mode: first of all, with my network without password, and I verified the adapter actually works in promiscuous mode; then, I tried with password set on: be aware the version of Wireshark. To check if promiscuous mode is enabled, click Capture > Options and verify the “Enable promiscuous mode on all interfaces” checkbox is activated at. For item (2), I don't use that distribution so do not know for sure. Tcpdump provides a CLI packet sniffer, and Wireshark provides a feature-rich GUI for sniffing and analyzing packets.