Developers have published links for direct download on different operating systems
Network security and ethical hacking experts from the International Institute of Cyber Security report the launching of Wireshark 3.0.0, replacing the WinPcap Packet Capture Library, which will no longer receive support.
Wireshark is an open source network protocol analysis software functional on multiple platforms, such as Windows and most UNIX and similar platforms, such as Linux, FreeBSD and MacOS, reported network security experts.
Wireshark is also being used by security experts, developers and trainers to analyze and troubleshoot, in addition to interactively capturing and navigating packet traffic on computer networks.
Since it is now being shipped with NPCAP, Wireshark 3.0.0 includes support for loopback capture and 802.11 WiFi monitor mode capture, if supported by the NIC controller, network security experts mention.
The Npcap home page mentions: “Npcap works on Windows 7 and later when using the new light weight filter API (LWF) NDIS 6. It is faster than the NDIS 5 API, now considered obsolete and that Microsoft could delete at any time”.
While network security specialists mention that the list of bug fixes in the 3.0.0 version is very small (only four bugs were corrected), the list of new or updated features is really extensive, covering all the new Incorporating from the previous version, Wireshark 2.6.0.
The latest version also includes a list of the new protocols you can capture, from Apple Wireless Direct Link (AWDL) and Cisco Meraki Discovery Protocol (MDP) to the 5g network protocols NGAP, XnAP, NR and E1AP.
Although developers have provided links to download the tool directly for the latest versions of the Windows and MacOS systems, most Linux and UNIX system vendors offer their own packages, which can be installed using the package management system included on each platform. Wireshark has also launched a special page to download packages provided by third parties.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.