Wireshark 2.6.4

Wireshark provides detailed information about network traffic and usage through deep analysis

 
largeImg.png?version=2%2E6%2E4

Share

If you've ever wondered just how your network is being used, Wireshark may be the tool you have been looking for. Network analysers are nothing new, but they have a tendency to be impenetrable programs reliant on command line operations and provide information in a text-based form which can be difficult to interpret. Wireshark boasts a graphical front end which makes it easy to analyse all traffic which travels over a network using a variety of protocols.

Data packets can be captured from both wired and wireless network and this information can be viewed live as it is captured or analysed at a later date. The wealth of information that the program can reveal about network usage is staggering, and support for plugins means that the tool can be extended to add new protocols and features further down the line. Wireshark is available for Windows, Linux and Mac, making it ideal for mixed platform networks.

As well as working with data that has been captured directly through Wireshark itself, it is also possible to analyse data that has been captured with the likes of Aircrack, tcpdump and CA NetMaster. Easy to configure colouring and filtering makes it simple to make sense of complex data, and while this is not a tool for the average home user, it remains powerful yet approachable.

Note the Windows download here is for the 32-bit version.

Version 2.6.4 changes (Release Notes):

- Lots of changes!

Verdict ratingsratingsratingsratingsratings

An immensely powerful tool which provides all of the information you could possibly need about network traffic

Specification: Wireshark 2.6.4:

Platforms:
Windows XP,Windows Vista (32 bit),Windows 7 (32 bit),Windows 8,windows 10,Mac OS X
Version:
2.6.4
Licence:
Freeware
Developer:
Wireshark Foundation
Date Added:
October 13, 2018

"Recommended For You"

Russians start selling Wi-Fi encryption cracker Microsoft holds back info on programs prone to DLL hijacking attacks