Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1245

Wireshark

What is Wireshark?

WiresharkAn open-source network protocol analyzer that captures and inspects packets in real time for troubleshooting, security analysis, and education.


Wireshark is the leading open-source packet analyzer, originally written by Gerald Combs in 1998 as Ethereal and maintained by a global developer community under the Wireshark Foundation. It captures live traffic from wired, wireless, USB, and other interfaces and decodes thousands of protocols, from Ethernet and TCP/IP to industrial and crypto protocols. Network engineers, blue teamers, malware analysts, and threat hunters use it to diagnose performance issues, validate firewalls, reconstruct attack timelines, and extract files from packet captures (PCAPs). Capturing traffic on networks you do not own or administer can violate wiretap and privacy laws, so authorization is essential.

Examples

  1. 01

    Filtering with http.request to triage a suspected web exfiltration channel.

  2. 02

    Following a TCP stream to extract a malicious payload from a captured session.

Frequently asked questions

What is Wireshark?

An open-source network protocol analyzer that captures and inspects packets in real time for troubleshooting, security analysis, and education. It belongs to the Defense & Operations category of cybersecurity.

What does Wireshark mean?

An open-source network protocol analyzer that captures and inspects packets in real time for troubleshooting, security analysis, and education.

How does Wireshark work?

Wireshark is the leading open-source packet analyzer, originally written by Gerald Combs in 1998 as Ethereal and maintained by a global developer community under the Wireshark Foundation. It captures live traffic from wired, wireless, USB, and other interfaces and decodes thousands of protocols, from Ethernet and TCP/IP to industrial and crypto protocols. Network engineers, blue teamers, malware analysts, and threat hunters use it to diagnose performance issues, validate firewalls, reconstruct attack timelines, and extract files from packet captures (PCAPs). Capturing traffic on networks you do not own or administer can violate wiretap and privacy laws, so authorization is essential.

How do you defend against Wireshark?

Defences for Wireshark typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Wireshark?

Common alternative names include: Ethereal, tshark.

Related terms

See also