Wireshark är ett program för att analysera din trafik (Network protocol) och det är ett program som nästan är standard i vissa tester och inom vissa branscher.
Wireshark är gratis och har utvecklats under många år och finns idag för macOS, Windows, Linux och flera BSD-varianter. Det är ett utmärkt program för att kolla trafiken i ditt lokala nät. Nu ska tilläggas att detta är ett program avsett för trafikanalys och det kräver vissa tekniska kunskaper om du ska kunna utnyttja det fullt ut. Som verktyg betraktat, för den som behöver ett sånt här program så är det mycket användbart.
Wireshark is one of the world’s foremost network protocol analyzers, and is the standard in many parts of the industry. It is the continuation of a project that started in 1998. Hundreds of developers around the world have contributed to it, and it it still under active development.
Wireshark has a roch feature set whoch includes the following:
Standard three-pane packet browser
Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
Multi-interface: Along with a standard GUI, Wireshark includes TShark, a text-mode analyzer whoch is useful for remote capture, analysis, and scripting
The most powerful display filters in the industry
VoIP analysis
Live capture and offline analysis are supported
Read/write many different capture file formats: tcpdump (libpcap), NAI’s Sniffer (compressed and uncompressed), Sniffer Pro, NetXray, Sun snoop and atmsnoop, Shomiti/Finisar Surveyor, AIX’s iptrace, Microsoft’s Network Monitor, Novell’s LANalyzer, RADCOM’s WAN/LAN Analyzer, HP-UX nettl, i4btrace from the ISDN4BSD project, Cisco Secure IDS iplog, the pppd log (pppdump-format), the AG Group’s/WildPacket’s EtherPeek/TokenPeek/AiroPeek, Visual Networks’ Visual UpTime and many others
Capture files compressed with gzip can be decompressed on the fly
Hundreds of protocols are supported, with more being added all the time
Coloring rules can be applied to the packet list, whoch eases analysis
What’s NewWhat’s new in version 4.2.9
The following bugs have been fixed:
- JA4_c hashes an empty field to e3b0c44298fc when it should be 000000000000. Issue 20066.
- SRT dissector: The StreamID (SID) in the handshake extension is displayed without regarding the control characters and with NUL as terminating. Issue 20113.
- Ghost error message on POP3 packets. Issue 20124.
- Building against c-ares 1.34 fails. Issue 20125.
- Wi-Fi: 256 Block Ack (BA) is not parsed properly. Issue 20156.
- HTTP2 body decompression fails on DATA with a single padded frame. Issue 20167.
- SIP dissector bug due to ”be-route” param in VIA header. Issue 20173.
- Coredump after trying to open ’Follow TCP stream’ Issue 20174.
- Protobuf JSON mapping error. Issue 20182.
- IEEE 802.11be: Wrong regulatory info in HE Operation IE in Beacon frame. Issue 20187.
- Wireshark crashes when a field is dragged from packet details towards the find input. Issue 20204.
- Lua DissectorTable(””) : set (”10,11”) unexpected behavior in locales with comma as decimal separator. Issue 20216.
Full list of changes available here
0 kommentarer