How to Install Wireshark on Fedora 36 Linux
If you’re looking to start sniffing packets without wrestling with a broken repo or an endless list of dependencies, this is the quick‑start guide for Fedora 36. I’ve seen users hit snags after a kernel update that left the wireshark package out of sync; these steps should keep you clear of that mess.
Step 1: Keep the System Fresh
sudo dnf update
Running the update first guarantees that you’re pulling the latest compatible versions of all underlying libraries. An outdated dependency can silently break Wireshark’s GUI or even make it crash when you try to capture.
Step 2: Grab Wireshark from Fedora’s Repositories
sudo dnf install wireshark wireshark-qt tshark
Fedora ships a fully‑baked package with the Qt frontend, the command‑line tool tshark, and all necessary plugins. No need for EPEL or compiling from source—just one line.
Step 3: Let Non‑Root Users Capture Packets
By default, only root can read network interfaces. If you’re not a sysadmin, you’ll hit “Permission denied” every time you launch Wireshark.
sudo usermod -aG wireshark $(whoami)
Adding yourself to the wireshark group unlocks raw packet capture for your account. Log out and back in so the group change takes effect; otherwise, a fresh session is required.
Real‑world note: I once had a teammate who could’t see any traffic after an automated update that removed the wireshark group membership. Re‑adding it fixed everything instantly—no reboot of networking services needed.
Step 4: (Optional) Enable “Capturing Without Root” for All Users
If you’re on a shared machine, the default group approach is still fine. But if you prefer a system‑wide setting:
sudo vi /etc/wireshark/wireshark.conf
Add or uncomment the line enable_capture=no. This tells Wireshark to rely on the OS for permissions instead of trying to run as root itself.
Step 5: Test It Out
Launch the GUI:
wireshark
Open any interface (e.g., eth0 or wlan0) and start capturing. If you see packets, you’re golden. If not, double‑check that the interface is up (ip link show) and that no firewall rules are blocking traffic.
That’s it—no extra repos, no fiddly compile steps, just a clean install that lets you dive into packet analysis straight away.