Recent versions of libpcap/WinPcap support capturing SS7 transported over TDM links (E1/T1/J1/E3/T3/J3). This page describes how to do that with various types of hardware.
With libpcap 0.9.2 or later on Linux, if libpcap has been built with support for the DAG API from Endace Measurement Systems, it should be possible to capture SS7 traffic with DAG cards from Endace.
With libpcap 0.9.1 or later on Linux, if libpcap has been built with support for the Septel API from Intel, it should be possible to capture SS7 traffic with Septel or NetStructure cards from Intel.
As indicated in this message: https://marc.info/?l=ethereal-dev&m=112892915122025&w=2, it is possible to use PCMCIA or PCI form hardware from Utel Systems to capture SS7 traffic with Wireshark on Windows. (The message was sent before the rename of Ethereal to Wireshark.) This requires a patched version of WinPcap.
BUT, according to this message, Utel no longer supports Ethereal/Wireshark.
More detail is needed for all of these, e.g. notes on building libpcap with DAG/Septel support (if the vendor doesn't supply information on that), links to the specific hardware supported, names of the devices on which to capture, and directions on how to say "I'm capturing MTP2 on this device" (you should just get that by default for the Septel/!NetStructure cards, you'd have to select it for the Endace cards).
Imported from https://wiki.wireshark.org/CaptureSetup/SS7 on 2020-08-11 23:12:02 UTC