Wireshark (32-bit)

3.0

Wireshark is a network protocol analyzer, and is the standard in many industries. It is the continuation of a project that started in 1998. Hundreds of developers around the world have contributed to it, and it is still under active development. Read or write many different capture file formats: tcpdump (libpcap), Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, NAI Sniffer (compressed and uncompressed), Sniffer Pro, and NetXray, Network Instruments Observer, Novell LANalyzer, RADCOM WAN or LAN Analyzer, Shomiti or Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, and WildPackets EtherPeek,TokenPeek, or AiroPeek.
DOWNLOAD
0/5 No votes
Developer
Wireshark Foundation
Version
3.0
Requirements
Windows XP / Vista / Windows 7 / Windows 8 / Windows 10
Size
51.7 MB

Report this app

Description

The Ethereal network protocol analyzer has changed its name to Wireshark. The name might be new, but the software is the same. Wireshark‘s powerful features make it the tool of choice for network troubleshooting, protocol development, and education worldwide.

Wireshark was written by networking experts around the world and is an example of the power of the open-source. The app is used by network professionals around the world for analysis, troubleshooting, software and protocol development, and education.

The program has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements.

Features and Highlights

  • Deep inspection of hundreds of protocols, with more being added all the time
  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many others
  • Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
  • Capture files compressed with gzip can be decompressed on the fly
  • Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)
  • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Coloring rules can be applied to the packet list for quick, intuitive analysis
  • Output can be exported to XML, PostScript®, CSV, or plain text

What's new

What's new in this version:

New:
- The Windows installers now ship with Npcap 0.9994. They previously shipped with Npcap 0.9991
- The Windows installers now ship with USBPcap 1.5.4.0. They previously shipped with USBPcap 1.5.3.0

Fixed:
- wnpa-sec-2020-09 GVCP dissector infinite loop
- Add decryption support for QUIC IETF version 0xfaceb001 and 0xfaceb002
- Windows Uninstall does not remove all files in Program Files
- The "relative sequence number" is same as "raw sequence number" when tcp.analyze_sequence_numbers:FALSE
- Importing profiles from a different Windows PC fails
- Decode as not working correctly with multiple user profiles
- Wireshark can misdissect the HE Radiotap field if it’s ever dissected one with any value unknown
- Buildbot crash output: fuzz-2020-06-19-5981.pcap
- Buildbot crash output: fuzz-2020-06-20-7665.pcap
- mergecap man page contains invalid formatting

Leave a Reply

Your email address will not be published. Required fields are marked *