See my answer to this other U&L Q&A titled: “tshark: There are no interfaces on which a capture can be done” in Amazon Linux AMI. The Amazon AMI images are based on CentOS images and so the steps I outlined in that answer should apply here as well.
You need to perform the following steps to allow non-root users access to the dumpcap file so that they can open it for use within tshark/wireshark.
$ sudo groupadd wireshark
$ sudo usermod -a -G wireshark saml
$ setcap cap_net_raw,cap_net_admin=eip /usr/sbin/dumpcap
NOTE: It should be noted here that after making the above changes you'll need to logout and log back in so that the new group gets picked up by your username. You can confirm with the groups
command.
$ groups
saml wheel wireshark
Launching wireshark
Once you've made the above changes you can now launch wireshark
. It should be noted that when you run it you'll still be presented with a dialog which makes you think it didn't work, but this is just giving you the opportunity to either run wireshark
as yourself, "unprivileged", or as root.
Step #1: After launching, you'll see this dialog.

Step #2: If you select unprivileged, you'll be presented with the main wireshark
GUI:

Step #3: If you select the available devices, you'll notice that you can see these in promiscuous mode, which typically is not an option without the above capabilities changes:
