What's NEW in Wireshark 4.0 // Interview with Gerald Combs - Wireshark Creator
HTML-код
- Опубликовано: 9 июн 2024
- In this interview with the creator of Wireshark, Gerald Combs, we learn about the latest update to the world's most popular protocol analyzer. New features, filters, and usage tips straight from the guy who wrote it!
//Links and Things//
Wireshark 4.0 Release Notes: www.wireshark.org/update/reln...
Report issues or suggest features:
gitlab.com/wireshark/wireshar...
Sharkfest Europe 2022
sharkfesteurope.wireshark.org...
== More On-Demand Training from Chris ==
▶Getting Started with Wireshark - bit.ly/udemywireshark
▶Getting Started with Nmap - bit.ly/udemynmap
== Live Wireshark Training ==
▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
== Private Wireshark Training ==
Let's get in touch - packetpioneer.com/product/pri... - Наука
Thank you Wireshark team for giving us such an useful tool. Appreciate the time and effort! Thank you Chris for this interview.
Awesome interview Chris! Its great to see our favourite software is getting updated!
But I still want to have the dark mode for wireshark UI.
Thanks for hosting such a nice interview.
One feature that is finally added is the stream id for udp and tcp in the conversation tables
Thanks a lot for all the wireshark team, we love you. will be nice a video about these major changes with you normally clear examples chris.
as always great job.
i was using this wireshark version for a while and seems there is a bug on the RTP feature due now we are not able to ear the RTP audio on the inbuild player, due we work with VoIP systems we must force to do a rollback :(
This man is an inspiration for me. I use wireshark to deepen my knowledge of networking and I am incredibly thankful😊
Awesome, time to upgrade!
Thank you for everything you do for the Packet Head community!
Will Wireshark support natively ETL files ? That would be so great. I know there is a tool from Microsoft but still
awesome video Chris.
and thanks to Gerald and all the team at wireshark for the amazing product that is wrireshark
Great video , Thanks guys
Nice to see the creator 😀
hello Chris good to see u again with a such good news
Great interview!!
Thanks!
is there any virtual network interface that can be hidden from wireshark or ifconfig or any other network related command on linux or osx?
Great insights, thank dude😅😄
Glad you enjoyed! Thanks buddy.
Very nice 👍🏻
lucky guy : ) what an honor
Hey Chris, Can you show us what can be seen when a ddos attack occurs in wireshark or what can you look for.
Hi Chris I'm Impressed your work on analyzing packets can you do me a favor that "How WPA2-Personal works what progress taken place like handshake dhcp key exchange"
Awesome! Great job both. Gerald, it is wonderful that I can now search for the Poop emoji! (you made me spit my coffee) Even in my tunneled GRE with multi headers. Trying now to covertly hide the poop in the DSCP field. Besides Hansang and a few VOIP folk, who looks at DSCP (~_^)
Much Love,
Larry Greenblatt
Hey I am gonna find a sample pcap to share so everyone can practice the poop filter. 😆
Hi sir, excellent video sir, can u please make a video on Layer 2,3,4 Headers and Trailers with packet diagram with detailed explanation,
Tq Sir
Is it possible to decrypt ssl with wireshark?
Yep! If you have the decryption keys. Getting those is the hard part…
Yo man thanks for the video. Do we have any discord or slack to connect with the community people's.
Here's the invite for the Discord server, discord.com/invite/ts9GZCjGj5
works gj
Will it support iOS and android ?
Gerald didn't mention support for those OS's yet. Have you tried cloudshark.io? It's a good go-between in the meantime.
@@ChrisGreer it appears that it can track only browser packet not iOS and android packets and also not open source . I will try to enable mobile hotspot from my windows laptop where I have wireshark installed and connect iOS and android device and try . Have you tried this method ?
I have never heard of him but u gotta start somewhere
gg
Anyone manage to get the 💩 emoji into wireshark filters? (asking for a friend)
Not yet but I will find a way to turn that filter into a lab exercise at some point!