Overview
Wireshark is the world's most popular network protocol analyzer. It is used for troubleshooting, analysis, development and industries and educational institutions.
Features includes deep inspection of hundreds of protocols, with more being added all the time, Live capture and offline analysis, Standard three-pane packet browser, Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility, and Rich VoIP analysis.
Key Features
Here are key features of Wireshark:
- Deep inspection of hundreds of protocols, with more being added all the time
- Live capture and offline analysis
- Standard three-pane packet browser
- Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
- Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
- The most powerful display filters in the industry
- Rich VoIP analysis
- Read/write many different capture file formats
- Capture files compressed with gzip can be decompressed on the fly
- Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platfrom)
- Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
- Coloring rules can be applied to the packet list for quick, intuitive analysis
- Output can be exported to XML, PostScript, CSV, or plain text
Download Wireshark 1.8.5
Wireshark is available for download from Wireshark - Download website. Download the files most appropriate for you.
What's New in Wireshark 1.8.5
Bug Fixes
The following bugs have been fixed.
- SNMPv3 Engine ID registration. (Bug 2426)
- Wrong decoding of gtp.target identification. (Bug 3974)
- Reassemble.c leaks memory for GLIB > 2.8. (Bug 4141)
- Wireshark crashes when starting due to out-of-date plugin left behind from earlier installation. (Bug 7401)
- Failed to dissect TLS handshake packets. (Bug 7435)
- ISUP dissector problem with empty Generic Number. (Bug 7632)
- Illegal character is used in temporary capture file name. (Bug 7877)
- Lua code crashes wireshark after update to 1.8.3. (Bug 7976)
- Timestamp info is not saved correctly when writing DOS Sniffer files. (Bug 7998)
- 1.8.3 Wireshark User's Guide version is 1.6. (Bug 8009)
- Core dumped when the file is closed. (Bug 8022)
- LPP is misspelled in APDU parameter in e-CIDMeasurementInitiation request for LPPA message. (Bug 8023)
- Wrong packet bytes are selected for ISUP CUG binary code. (Bug 8035)
- Decodes FCoE Group Multicast MAC address as Broadcom MAC address. (Bug 8046)
- The SSL dissector stops decrypting the SSL conversation with Malformed Packet:SSL error messages. (Bug 8075)
- Unable to Save/Apply [Unistim Port] in Preferences. (Bug 8078)
- Some Information Elements in GTPv2 are not dissected correctly. (Bug 8079)
- Wrong bytes highlighted with "Find Packet...". (Bug 8085)
- 3GPP ULI AVP. SAI is not correctly decoded. (Bug 8098)
- Wireshark does not show "Start and End Time" information for Cisco Netflow/IPFIX with type 154 to 157. (Bug 8105)
- GPRS Tunnel Protocoll GTP Version 1 does not decode DAF flag in Common Flags IE. (Bug 8193)
- Wrong parcing of ULI of gtpv2 messages - errors in SAC, RAC & ECI. (Bug 8208)
- Version Number in EtherIP dissector. (Bug 8211)
- Warn Dissector bug, protocol JXTA. (Bug 8212)
- Electromagnetic Emission Parser parses field Event Id as Entity Id. (Bug 8227)
Updated Protocol Support
ANSI IS-637-A, ASN.1 PER, AX.25, Bluetooth HCI, CLNP, CSN.1, DCP-ETSI, DIAMETER, DIS PDU, DOCSIS CM-STATUS, DTLS, DTN, EtherIP, Fibre Channel, GPRS, GTP, GTPv2, HomePlug AV, IEEE 802.3 Slow, IEEE 802.15.4, ISUP, JXTA, LAPD, LPPa, MPLS, MS-MMC, NAS-EPS, NTLMSSP, ROHC, RSL, RTPS, SDP, SIP, SNMP, SSL
New and Updated Capture File Support
DOS Sniffer
Source:
For more information about resources for Wireshark 1.8.5, go to the following website: Wireshark 1.8.5 Release Notes
No comments:
Post a Comment