The Ethereal network protocol analyzer has changed its name to Wireshark.
The name might be new, but the software is the same. Wireshark's powerful features make it the tool of choice for network troubleshooting, protocol development, and education worldwide.
Wireshark was written by networking experts around the world, and is an example of the power of open source
Wireshark is used by network professionals around the world for analysis, troubleshooting, software and protocol development and education.
The program has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements.
· Data can be captured "off the wire" from a live network connection, or read from a capture file.
· Wireshark can read capture files from tcpdump (libpcap), NAI's Sniffer (compressed and uncompressed), Sniffer Pro, NetXray, Sun snoop and atmsnoop, Shomiti/Finisar Surveyor, AIX's iptrace, Microsoft's Network Monitor, Novell's LANalyzer, RADCOM's WAN/LAN Analyzer, HP-UX nettl, i4btrace from the ISDN4BSD project, Cisco Secure IDS iplog, the pppd log (pppdump-format), the AG Group's/WildPacket's EtherPeek/TokenPeek/AiroPeek, or Visual Networks' Visual UpTime. It can also read traces made from Lucent/Ascend WAN routers and Toshiba ISDN routers, as well as the text output from VMS's TCPIPtrace utility and the DBS Etherwatch utility for VMS. Any of these files can be compressed with gzip and Ethereal will decompress them on the fly.
· Live data can be read from Ethernet, FDDI, PPP, Token-Ring, IEEE 802.11, Classical IP over ATM, and loopback interfaces (at least on some platforms; not all of those types are supported on all platforms).
· Captured network data can be browsed via a GUI, or via the TTY-mode "tethereal" program.
· Capture files can be programmatically edited or converted via command-line switches to the "editcap" program.
· 602 protocols can currently be dissected
· Output can be saved or printed as plain text or PostScript.
· Data display can be refined using a display filter.
· Display filters can also be used to selectively highlight and color packet summary information.
· All or part of each captured network trace can be saved to disk.
Requirements:
· WinPcap 4.x
What's New in This Release:
The following bugs have been fixed:
· A TCP stream would not always be recognized as the same stream. (Bug 2907)
· Wireshark Crashing by pressing 2 Buttons. (Bug 4645)
· A crash can occur in the NTLMSSP dissector. (Bug 5157)
· The column texts from a Lua dissector could be mangled. (Bug 5326) (Bug 5630)
· Corrections to ANSI MAP ASN.1 specifications. (Bug 5584)
· When searching in packet bytes, the field and bytes are not immediately shown. (Bug 5585)
· Malformed Packet: ULP reported when dissecting ULP SessionID PDU. (Bug 5593)
· Wrong IEI in container of decode_gtp_mm_cntxt. (Bug 5598)
· Display filter does not work for expressions of type BASE_DEC, BASE_DEC_HEX and BASE_HEX_DEC. (Bug 5606)
· NTLMSSP dissector may fail to compile due to space embedded in C comment delimiters. (Bug 5614)
· Allow for name resolution of link-scope and multicast IPv6 addresses from local host file. (Bug 5615)
· DHCPv6 dissector formats DUID_LLT time incorrectly. (Bug 5627)
· Allow for IEEE 802.3bc-2009...