Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a measuring device used to examine what's going on inside a network cable, just like a voltmeter is used by an electrician to examine what's going on inside an electric cable (but at a higher level, of course). In the past, such tools were either very expensive, proprietary, or both. However, with the advent of Wireshark, all that has changed. Wireshark is perhaps one of the best open source packet analyzers available today.
Deep inspection of hundreds of protocols, with more being added all the time Live capture and offline analysis Standard three-pane packet browser Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility The most powerful display filters in the industry Rich VoIP analysis Read/write many different capture file formats Capture files compressed with gzip can be decompressed on the fly Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platfrom) Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2 Coloring rules can be applied to the packet list for quick, intuitive analysis Output can be exported to XML, PostScript®, CSV, or plain text
Wireshark 4.4.2 changelog:
The following vulnerabilities have been fixed
wnpa-sec-2024-14 FiveCo RAP dissector infinite loop. Issue 20176. wnpa-sec-2024-15 ECMP dissector crash. Issue 20214.
The following bugs have been fixed
CIP I/O is not detected by "enip" filter anymore. Issue 19517. Fuzz job issue: fuzz-2024-09-03-7550.pcap. Issue 20041. OSS-Fuzz 71476: wireshark:fuzzshark_ip_proto-udp: Index-out-of-bounds in DOFObjectID_Create_Unmarshal. Issue 20065. JA4_c hashes an empty field to e3b0c44298fc when it should be 000000000000. Issue 20066. Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone Mirroring. Issue 20082. PTP analysis loses track of message associations in case of sequence number resets. Issue 20099. USB CCID: response packet in case SetParameters command is unsupported is flagged as malformed. Issue 20107. dumpcap crashes when run from TShark with a capture filter. Issue 20108. SRT dissector: The StreamID (SID) in the handshake extension is displayed without regarding the control characters and with NUL as terminating. Issue 20113. Ghost error message on POP3 packets. Issue 20124. Building against c-ares 1.34 fails. Issue 20125. D-Bus is not optional anymore. Issue 20126. macOS Intel DMGs aren't fully notarized. Issue 20129. Incorrect name for MLD Capabilities and Operations Present flag in dissection of MLD Capabilities for MLO wifi-7 capture. Issue 20134. CQL Malformed Packet v4 S → C Type RESULT: Prepared[Malformed Packet] Issue 20142. Wi-Fi: 256 Block Ack (BA) is not parsed properly. Issue 20156. BACnet ReadPropertyMultiple request Maximum allowed recursion depth reached. Issue 20159. Statistics→I/O Graph crashes when using simple moving average. Issue 20163. HTTP2 body decompression fails on DATA with a single padded frame. Issue 20167. Compiler warning for ui/tap-rtp-common.c (ignoring return value) Issue 20169. SIP dissector bug due to "be-route" param in VIA header. Issue 20173. Coredump after trying to open 'Follow TCP stream' Issue 20174. Protobuf JSON mapping error. Issue 20182. Display filter "!stp.pvst.origvlan in { vlan.id }" causes a crash (Version 4.4.1) Issue 20183. Extcap plugins shipped with Wireshark Portable are not found in version 4.4.1. Issue 20184. IEEE 802.11be: Wrong regulatory info in HE Operation IE in Beacon frame. Issue 20187. Wireshark 4.4.1 does not decode RTCP packets. Issue 20188. Qt: Display filter sub-menu can only be opened on the triangle, not the full name. Issue 20190. Qt: Changing the display filter does not update the Conversations or Endpoints dialogs. Issue 20191. MODBUS Dissector bug. Issue 20192. Modbus dissector bug - Field Occurence and Layer Operator modbus.bitval field. Issue 20193. Wireshark crashes when a field is dragged from packet details towards the find input. Issue 20204. Lua DissectorTable("") : set ("10,11") unexpected behavior in locales with comma as decimal separator. Issue 20216.
New and Updated Features
The TShark syntax for dumping only fields with a certain prefix has changed from -G fields prefix to -G fields,prefix. This allows tshark -G fields to again support also specifying the configuration profile to use.
Updated Protocol Support
ARTNET, ASN.1 PER, BACapp, BT BR/EDR, CQL, DOF, ECMP, ENIP, FiveCo RAP, Frame, FTDI FT, HSRP, HTTP/2, ICMPv6, IEEE 802.11, MBTCP, MMS, MPEG PES, PN-DCP, POP, ProtoBuf, PTP, RPC, RTCP, SIP, SRT, Syslog, TCP, UMTS RLC, USB CCID, Wi-SUN, and ZigBee ZCL
New and Updated Capture File Support
BLF
Download: Wireshark 4.4.2 | 83.2 MB (Open Source)
Download: Portable Wireshark 4.4.2 | ARM64 Installer
View: Wireshark Website