Wireshark 1.4.3

Published January 14, 2011 by Download Software

Wireshark is the world’s foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard across many industries and educational institutions.

Feature:

  • Deep inspection of hundreds of protocols, with more being added all the time
  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
  • Capture files compressed with gzip can be decompressed on the fly
  • Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)
  • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Coloring rules can be applied to the packet list for quick, intuitive analysis
  • Output can be exported to XML, PostScript®, CSV, or plain text

System Requirements:

Changelog:

# The following bugs have been fixed:

* AMQP failed assertion. (Bug 4048)
* Reassemble.c leaks memory for GLIB > 2.8. (Bug 4141)
* Fuzz testing reports possible dissector bug: TCP. (Bug 4211)
* Wrong length calculation in new_octet_aligned_subset_bits() (PER dissector). (Bug 5393)
* Function dissect_per_bit_string_display might read more bytes than available (PER dissector). (Bug 5394)
* Cannot load wpcap.dll & packet.dll from Wireshark program directory. (Bug 5420)
* Wireshark crashes with Copy -> Description on date/time fields. (Bug 5421)
* DHCPv6 OPTION_CLIENT_FQDN parse error. (Bug 5426)
* Information element Error for supported channels. (Bug 5430)
* Assert when using ASN.1 dissector with loading a ‘type table’. (Bug 5447)
* Bug with RWH parsing in Infiniband dissector. (Bug 5444)
* Help->About Wireshark mis-reports OS. (Bug 5453)
* Delegated-IPv6-Prefix(123) is shown incorrect as X-Ascend-Call-Attempt-Limit(123). (Bug 5455)
* “tshark -r file -T fields” is truncating exported data. (Bug 5463)
* gsm_a_dtap: incorrect “Extraneous Data” when decoding Packet Flow Identifier. (Bug 5475)
* Improper decode of TLS 1.2 packet containing both CertificateRequest and ServerHelloDone messages. (Bug 5485)
* LTE-PDCP UL and DL problem. (Bug 5505)
* CIGI 3.2/3.3 support broken. (Bug 5510)
* Prepare Filter in RTP Streams dialog does not work correctly. (Bug 5513)
* Wrong decode at ethernet OAM Y.1731 ETH-CC. (Bug 5517)
* WPS: RF bands decryption. (Bug 5523)
* Incorrect LTP SDNV value handling. (Bug 5521)
* LTP bug found by randpkt. (Bug 5323)
* Buffer overflow in SNMP EngineID preferences. (Bug 5530)

# Updated Protocol Support
* AMQP, ASN.1 BER, ASN.1 PER, CFM, CIGI, DHCPv6, Diameter, ENTTEC, GSM A GM, IEEE 802.11, InfiniBand, LTE-PDCP, LTP, MAC-LTE, MP2T, RADIUS, SAMR, SCCP, SIP, SNMP, TCP, TLS, TN3270, UNISTIM, WPS

# New and Updated Capture File Support
* Endace ERF, Microsoft Network Monitor, VMS TCPtrace.

Download: Wireshark is 1.4.3 (32-bit)

Download: Wireshark is 1.4.3 (64-bit)




Sponsored Links (What this)


Readers Comments (0)


Comments are closed.

Latest Update

Rufus 4.0.2035

Rufus is an utility that helps format and create bootable USB flash drives, such as USB keys/pendrives, memory sticks, etc. It can be especially useful ... Download »

Subscribe

Sign up to receive daily email updates of Srcwb.net latest software update. Enter your email address below: