-
Latest Version
Wireshark 4.4.1 LATEST
-
Review by
-
Operating System
macOS 10.12 Sierra or later
-
User Rating
Click to vote -
Author / Product
-
Filename
Wireshark 4.4.1 Intel 64.dmg
Wireshark for macOS was written by networking experts around the world, and is an example of the power of open source. The app is used by network professionals around the world for analysis, troubleshooting, software and protocol development and education.
The program has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements.
Features and Highlights
- Deep inspection of hundreds of protocols, with more being added all the time
- Live capture and offline analysis
- Standard three-pane packet browser
- Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many others
- Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
- The most powerful display filters in the industry
- Rich VoIP analysis
- Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
- Capture files compressed with gzip can be decompressed on the fly
- Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)
- Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
- Coloring rules can be applied to the packet list for quick, intuitive analysis
- Output can be exported to XML, PostScript®, CSV, or plain text
What's new in this version:
The following vulnerabilities have been fixed:
- wnpa-sec-2024-12 ITS dissector crash
- wnpa-sec-2024-13 AppleTalk and RELOAD Framing dissector crashes
The following bugs have been fixed:
- Refresh interface during live-capture leads to corrupt interface handling
- Media type "application/octet-stream" registered for both Thread and UASIP
- Extcap toolbar stops working when new interface is added
- Decoding error ITS CPM version 2.1.1
- Build error in 4.3.0: sync_pipe_run_command_actual error: argument 2 is null but the corresponding size argument 3 value is 512004 [-Werror=nonnull] Issue 19930.
- html2text.py doesn’t handle the <sup> tag
- Incorrect NetFlow v8 TOS AS aggregation dissection
- The Windows packages don’t ship with the IP address plugin
- O_PATH is Linux-and-FreeBSD-specific
- Wireshark 4.4.0 doesn’t install USBcap USBcapCMD.exe in the correct directory
- OER dissector is not considering the preamble if ASN.1 SEQUENCE definition includes extension marker but no OPTIONAL items
- Bluetooth classic L2CAP incorrect dissection with connectionless reception channel
- Profile auto switch filters : Grayed Display Filter Expression dialog box when opened from Configuration Profiles dialog box
- Wireshark 4.4.0 / macOS 14.6.1 wifi if monitor mode
- TECMP Data Type passes too much data to sub dissectors
- Wireshark and tshark 4.4.0 ignore extcap options specified on the command line
- Cannot open release notes due to incorrect path with duplicated directory components
- Unable to open "Release Notes" from the "Help" menu
- No capture interfaces if Wireshark is started from command line with certain paths
- Wireshark 4.4.0 extcap path change breaks third party extcap installers
- Fuzz job UTF-8 encoding issue: fuzz-2024-09-10-7618.pcap
- Unable to create larger files than 99 size units
- Opening Wireshark 4.4.0 on macOS 15.0 disconnects iPhone Mirroring
- PRP trailer not shown for L2 IEC 61850 GOOSE packets in 4.4.0 (was working in 4.2.7) Issue 20088.
- GUI lags because NetworkManager keeps turning 802.11 monitor mode off
- Error while getting Bluetooth application process id by <shell:ps -A | grep com.*android.bluetooth> Issue 20100.
- Fuzz job assertion: randpkt-2024-10-05-7200.pcap
New and Updated Features:
- The TShark syntax for dumping only fields with a certain prefix has changed from -G fields prefix to -G fields,prefix. This allows tshark -G fields to again support also specifying the configuration profile to use.
Updated Protocol Support:
- AppleTalk, ARTNET, BGP, BT L2CAP, CIGI, CIP Motion, CoAP, COSE, DISTCC, DMP, Ethernet OAM PDU, F5 FILEINFO, GIOP, GOOSE, GSM Management, GSM SIM, GTP, HTTP, HTTP2, ID3v2, IDN, IEEE 1609.2, IEEE 802.11, IPPUSB, iRDMA, ISystemActivator, ITS, Kerberos, LwM2M-TLV, MMS, MQ, MySQL, NCP SSS, NetFlow, OER, OWAMP, QNET, RELOAD Framing, RTCP, RTLS, SANE, SMB2, SSyncP, Sysdig Event, T.124, TECMP, Thread, Thrift, and TWAMP
New and Updated Capture File Support:
- BLF, CLLOG, CommView, ERF, and pcap
- OperaOpera 114.0 Build 5282.185
- PhotoshopAdobe Photoshop CC 2024 25.12
- OKXOKX - Buy Bitcoin or Ethereum
- Hero WarsHero Wars - Online Action Game
- Adobe AcrobatAdobe Acrobat Pro 2024.002.20854
- TradingViewTradingView - Track All Markets
- ParallelsParallels Desktop 20.1.1
- 4K Video4K Video Downloader+ 1.10.0
- CleanMyMacCleanMyMac X 4.15.8
- 4DDiG4DDiG Mac Data Recovery 5.2.2
Comments and User Reviews