Wireshark (64bit)1.12.5

Wireshark is a widely used network analysis tool that provides detailed insights into network traffic. Developed by the Wireshark community, it is an open-source software that allows users to capture, analyze, and interpret network packets in real-time.

With its user-friendly interface and extensive protocol support, Wireshark has become an indispensable tool for network administrators, security professionals, and developers. It can be utilized for various purposes, including network troubleshooting, protocol development, network security analysis, and educational research.

One of the key features of Wireshark is its ability to capture packets from different network interfaces and protocols. It provides a live capture option, enabling users to observe network traffic in real-time. Additionally, it supports the analysis of encrypted protocols, making it a valuable tool for identifying potential security vulnerabilities.

Wireshark's powerful filtering capabilities allow users to focus on specific network packets and extract relevant information. It provides detailed packet-level analysis, displaying important details such as source and destination IP addresses, packet timing, and protocol-specific data. This level of granularity enables users to diagnose network issues efficiently.

Furthermore, Wireshark offers a range of advanced features, including packet decryption, protocol dissectors, and the ability to export captured data for further analysis. Its extensibility through custom plugins and scripting allows users to tailor the tool to their specific needs.

Wireshark is a versatile and powerful network analysis tool that provides comprehensive insights into network traffic. Whether you are a network administrator, security professional, or developer, Wireshark's robust features and capabilities make it an essential tool in your toolkit.

Key Features:

  • Packet capture and analysis.
  • Support for numerous network protocols.
  • Real-time monitoring.
  • Powerful filtering and search options.
  • Colorized packet display.
  • Packet decoding and reconstruction.
  • Statistics and graphs.
  • Protocol dissection and analysis.
  • Extensibility and customization.
  • Cross-platform compatibility.


Wireshark

What's New

Version 1.12.5

Bug Fixes

  • The LBMR dissector could go into an infinite loop. 
  • The WebSocket dissector could recurse excessively.
  • The WCP dissector could crash while decompressing data. 
  • The X11 dissector could leak memory. 
  • The packet reassembly code could leak memory. 
  • The IEEE 802.11 dissector could go into an infinite loop.
  • The Android Logcat file parser could crash. Discovered by Hanno Böck. 
  • Wireshark crashes if "Update list of packets in real time" is disabled and a display filter is applied while capturing. (Bug 6217)
  • EAPOL 4-way handshake information wrong. (Bug 10557)
  • RPC NULL calls incorrectly flagged as malformed. (Bug 10646)
  • Wireshark relative ISN set incorrectly if raw ISN set to 0. (Bug 10713)
  • Buffer overrun in encryption code. (Bug 10849)
  • Crash when use Telephony / Voip calls. (Bug 10885)
  • ICMP Parameter Problem message contains Length of original datagram is treated as the total IPv4 length. (Bug 10991)
  • ICMP Redirect takes 4 bytes for IPv4 payload instead of 8. (Bug 10992)
  • Missing field "tcp.pdu.size" in TCP stack. (Bug 11007)
  • Sierra EM7345 marks MBIM packets as NCM. (Bug 11018)
  • Possible infinite loop DoS in ForCES dissector. (Bug 11037)
  • "Decode As…" crashes when a packet dialog is open. (Bug 11043)
  • Interface Identifier incorrectly represented by Wireshark. (Bug 11053)
  • "Follow UDP Stream" on mpeg packets crashes wireshark v.1.12.4 (works fine on v.1.10.13). (Bug 11055)
  • Annoying popup when trying to capture on bonds. (Bug 11058)
  • Request-response cross-reference in USB URB packets incorrect. (Bug 11072)
  • Right clicking in Expert Infos to create a filter (duplicate IP) results in invalid filters. (Bug 11073)
  • CanOpen dissector fails on frames with RTR and 0 length. (Bug 11083)
  • Typo in secp521r1 curve wrongly identified as sect521r1. (Bug 11106)
  • packet-zbee-zcl.h: IS_ANALOG_SUBTYPE doesn’t filter ENUM. (Bug 11120)
  • Typo: "LTE Positioning Protocol" abbreviated as "LPP", not "LLP". (Bug 11141)
  • Missing Makefile.nmake in ansi1/Kerberos directory. (Bug 11155)
  • Can’t build tshark without the Qt packages installed unless --without-qt is specified. (Bug 11157)

Program available in other languages

User Reviews

Security Levels

To avoid any potential harm to your device and ensure the security of your data and privacy, our team checks every time a new installation file is uploaded to our servers or linked to a remote server and periodically reviews the file to confirm or update its status. Based on this checking, we set the following security levels for any downloadable files.

Clean

It is highly likely that this software program is clean.

We scanned files and URLs associated with this software program in more than 60 of the world's leading antivirus services; no possible threats were found. And there is no third-party softwarebundled.

Warning

This program is advertising supported and may offer to install third-party programs that are not required. These may include a toolbar, changing your homepage, default search engine, or installing other party programs. These could be false positives, and our users are advised to be careful when installing and using this software.

Disabled

This software is no longer available for download. It is highly likely that this software program is malicious or has security issues or other reasons.

Submit a Report

Thank you!
Your report has been sent.

We will review your request and take appropriate action.

Please note that you will not receive a notification about anyaction taken dueto this report.We apologize for anyinconvenience this may cause.

We appreciate your help in keeping our website clean and safe.