Download Wireshark For Mac

  1. Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions.
  2. However, with Wireshark tool is that you can only gather information from the network but cannot send this information. Here, is a curated list of Top Alternative Tools which are capable of replacing Wireshark. This list includes open source (free) as well as commercial (paid) programs like Wireshark with popular features and latest download link.

Download Wireshark

To install Wireshark on Mac you first need to download an installer. To do this, download an installer such as exquartz. Once you’ve done this, open the Terminal and input the following command.

The current stable release of Wireshark is 3.4.8. It supersedes all previous releases. You can also download the latest development release (3.5.0) and documentation.

  • Windows Installer (64-bit)
  • Windows Installer (32-bit)
  • Windows PortableApps® (32-bit)
  • macOS Intel 64-bit .dmg
  • Source Code
  • Windows Installer (64-bit)
  • Windows Installer (32-bit)
  • Windows PortableApps® (32-bit)
  • macOS Intel 64-bit .dmg
  • Source Code
  • Windows Installer (64-bit)
  • Windows Installer (32-bit)
  • Windows PortableApps® (64-bit)
  • Windows PortableApps® (32-bit)
  • macOS Arm 64-bit .dmg
  • macOS Intel 64-bit .dmg
  • Source Code

Older Releases

All present and past releases can be found in our download area.

Installation Notes

For a complete list of system requirements and supported platforms, please consult the User's Guide.

Information about each release can be found in the release notes.

Download Wireshark For Mac

Each Windows package comes with the latest stable release of Npcap, which is required for live packet capture. If needed you can download separately from the Npcap web site.

You can also capture packets using WinPcap, although it is no longer maintained or supported.

Live on the Bleeding Edge

You can download source code packages and Windows installers which are automatically created each time code is checked into the source code repository. These packages are available in the automated build section of our download area.

Go Spelunking

You can explore the download areas of the main site and mirrors below. Past releases can be found by browsing the all-versions directories under each platform directory.

Stay Current

You can stay informed about new Wireshark releases by subscribing to the wireshark-announce mailing list. We also provide a PAD file to make automated checking easier.

Verify Downloads

File hashes for the 3.4.8 release can be found in the signatures file. It is signed with key id 0xE6FEAEEA. Prior to April 2016 downloads were signed with key id 0x21F2949A.

Stay Legal

Wireshark is subject to U.S. export regulations. Take heed. Consult a lawyer if you have any questions.

Wireshark packages are available for most platforms, including the ones listed below.

Download
Standard package: Wireshark is available via the default packaging system on that platform.
Vendor / PlatformSources
Alpine / Alpine LinuxStandard package
Apple / macOSHomebrew cask (includes UI)Homebrew formula (CLI only)
MacPorts
Fink
Arch Linux / Arch LinuxStandard package
Canonical / UbuntuStandard package
Latest stable PPA
Debian / Debian GNU/LinuxStandard package
The FreeBSD Project / FreeBSDStandard package
Gentoo Foundation / Gentoo LinuxStandard package
HP / HP-UXPorting And Archive Centre for HP-UX
NetBSD Foundation / NetBSDStandard package
NixOS / NixOSStandard package
Novell / openSUSE, SUSE LinuxStandard package
Offensive Security / Kali LinuxStandard package
PCLinuxOS / PCLinuxOSStandard package
Red Hat / FedoraStandard package
Red Hat / Red Hat Enterprise LinuxStandard package
Slackware Linux / SlackwareSlackBuilds.org
Oracle / Solaris 11Standard package
* / *The Written Word

Wireshark Download Mac Os

Table of Contents

Wireshark

Preface
1. Foreword
2. Who should read this document?
3. Acknowledgements
4. About this document
5. Where to get the latest copy of this document?
6. Providing feedback about this document
7. Typographic Conventions
7.1. Admonitions
7.2. Shell Prompt and Source Code Examples
1. Introduction
1.1. What is Wireshark?
1.1.1. Some intended purposes
1.1.2. Features
1.1.3. Live capture from many different network media
1.1.4. Import files from many other capture programs
1.1.5. Export files for many other capture programs
1.1.6. Many protocol dissectors
1.1.7. Open Source Software
1.1.8. What Wireshark is not
1.2. System Requirements
1.2.1. Microsoft Windows
1.2.2. macOS
1.2.3. UNIX, Linux, and BSD
1.3. Where To Get Wireshark
1.4. A Brief History Of Wireshark
1.5. Development And Maintenance Of Wireshark
1.6. Reporting Problems And Getting Help
1.6.1. Website
1.6.2. Wiki
1.6.3. Q&A Site
1.6.4. FAQ
1.6.5. Mailing Lists
1.6.6. Reporting Problems
1.6.7. Reporting Crashes on UNIX/Linux platforms
1.6.8. Reporting Crashes on Windows platforms
2. Building and Installing Wireshark
2.1. Introduction
2.2. Obtaining the source and binary distributions
2.3. Installing Wireshark under Windows
2.3.1. Installation Components
2.3.2. Additional Tasks
2.3.3. Install Location
2.3.4. Installing Npcap
2.3.5. Windows installer command line options
2.3.6. Manual Npcap Installation
2.3.7. Update Wireshark
2.3.8. Update Npcap
2.3.9. Uninstall Wireshark
2.3.10. Uninstall Npcap
2.4. Building from source under Windows
2.5. Installing Wireshark under macOS
2.6. Installing the binaries under UNIX
2.6.1. Installing from RPMs under Red Hat and alike
2.6.2. Installing from debs under Debian, Ubuntu and other Debian derivatives
2.6.3. Installing from portage under Gentoo Linux
2.6.4. Installing from packages under FreeBSD
2.7. Building from source under UNIX or Linux
3. User Interface
3.1. Introduction
3.2. Start Wireshark
3.3. The Main window
3.3.1. Main Window Navigation
3.4. The Menu
3.5. The “File” Menu
3.6. The “Edit” Menu
3.7. The “View” Menu
3.8. The “Go” Menu
3.9. The “Capture” Menu
3.10. The “Analyze” Menu
3.11. The “Statistics” Menu
3.12. The “Telephony” Menu
3.13. The “Wireless” Menu
3.14. The “Tools” Menu
3.15. The “Help” Menu
3.16. The “Main” Toolbar
3.17. The “Filter” Toolbar
3.18. The “Packet List” Pane
3.19. The “Packet Details” Pane
3.20. The “Packet Bytes” Pane
3.21. The Statusbar
4. Capturing Live Network Data
4.1. Introduction
4.2. Prerequisites
4.3. Start Capturing
4.4. The “Capture” Section Of The Welcome Screen
4.5. The “Capture Options” Dialog Box
4.6. The “Manage Interfaces” Dialog Box
4.7. The “Compiled Filter Output” Dialog Box
4.8. Capture files and file modes
4.9. Link-layer header type
4.10. Filtering while capturing
4.10.1. Automatic Remote Traffic Filtering
4.11. While a Capture is running …​
4.11.1. Stop the running capture
4.11.2. Restart a running capture
5. File Input, Output, And Printing
5.1. Introduction
5.2. Open Capture Files
5.2.1. The “Open Capture File” Dialog Box
5.2.2. Input File Formats
5.3. Saving Captured Packets
5.3.1. The “Save Capture File As” Dialog Box
5.3.2. Output File Formats
5.4. Merging Capture Files
5.4.1. The “Merge With Capture File” Dialog Box
5.5. Import Hex Dump
5.5.1. Standard ASCII Hexdumps
5.5.2. Regular Text Dumps
5.5.3. The “Import From Hex Dump” Dialog Box
5.5.4. File source
5.5.5. Input Format
5.5.6. Encapsulation
5.6. File Sets
5.6.1. The “List Files” Dialog Box
5.7. Exporting Data
5.7.1. The “Export Specified Packets” Dialog Box
5.7.2. The “Export Packet Dissections” Dialog Box
5.7.3. The “Export Selected Packet Bytes” Dialog Box
5.7.4. The “Export PDUs to File…​” Dialog Box
5.7.5. The “Export TLS Session Keys…​” Dialog Box
5.7.6. The “Export Objects” Dialog Box
5.8. Printing Packets
5.8.1. The “Print” Dialog Box
5.9. The “Packet Range” Frame
5.10. The Packet Format Frame
6. Working With Captured Packets
6.1. Viewing Packets You Have Captured
6.2. Pop-up Menus
6.2.1. Pop-up Menu Of The “Packet List” Column Header
6.2.2. Pop-up Menu Of The “Packet List” Pane
6.2.3. Pop-up Menu Of The “Packet Details” Pane
6.2.4. Pop-up Menu Of The “Packet Bytes” Pane
6.3. Filtering Packets While Viewing
6.4. Building Display Filter Expressions
6.4.1. Display Filter Fields
6.4.2. Comparing Values
6.4.3. Possible Pitfalls Using Regular Expressions
6.4.4. Combining Expressions
6.4.5. Slice Operator
6.4.6. Membership Operator
6.4.7. Functions
6.4.8. A Common Mistake with !=
6.4.9. Sometimes Fields Change Names
6.5. The “Display Filter Expression” Dialog Box
6.6. Defining And Saving Filters
6.7. Defining And Saving Filter Macros
6.8. Finding Packets
6.8.1. The “Find Packet” Toolbar
6.9. Go To A Specific Packet
6.9.1. The “Go Back” Command
6.9.2. The “Go Forward” Command
6.9.3. The “Go to Packet” Toolbar
6.9.4. The “Go to Corresponding Packet” Command
6.9.5. The “Go to First Packet” Command
6.9.6. The “Go to Last Packet” Command
6.10. Marking Packets
6.11. Ignoring Packets
6.12. Time Display Formats And Time References
6.12.1. Packet Time Referencing
7. Advanced Topics
7.1. Introduction
7.2. Following Protocol Streams
7.3. Show Packet Bytes
7.4. Expert Information
7.4.1. Expert Information Entries
7.4.2. The “Expert Information” Dialog
7.4.3. “Colorized” Protocol Details Tree
7.4.4. “Expert” Packet List Column (Optional)
7.5. TCP Analysis
7.6. Time Stamps
7.6.1. Wireshark Internals
7.6.2. Capture File Formats
7.6.3. Accuracy
7.7. Time Zones
7.7.1. Wireshark and Time Zones
7.8. Packet Reassembly
7.8.1. What Is It?
7.8.2. How Wireshark Handles It
7.8.3. TCP Reassembly
7.9. Name Resolution
7.9.1. Name Resolution Drawbacks
7.9.2. Ethernet Name Resolution (MAC Layer)
7.9.3. IP Name Resolution (Network Layer)
7.9.4. TCP/UDP Port Name Resolution (Transport Layer)
7.9.5. VLAN ID Resolution
7.9.6. SS7 Point Code Resolution
7.10. Checksums
7.10.1. Wireshark Checksum Validation
7.10.2. Checksum Offloading
8. Statistics
8.1. Introduction
8.2. The “Capture File Properties” Dialog
8.3. Resolved Addresses
8.4. The “Protocol Hierarchy” Window
8.5. Conversations
8.5.1. The “Conversations” Window
8.6. Endpoints
8.6.1. The “Endpoints” Window
8.7. Packet Lengths
8.8. The “I/O Graphs” Window
8.9. Service Response Time
8.9.1. The “SMB2 Service Response Time Statistics” Window
8.10. DHCP (BOOTP) Statistics
8.11. NetPerfMeter Statistics
8.12. ONC-RPC Programs
8.13. 29West
8.14. ANCP
8.15. BACnet
8.16. Collectd
8.17. DNS
8.18. Flow Graph
8.19. HART-IP
8.20. HPFEEDS
8.21. HTTP Statistics
8.21.1. HTTP Packet Counter
8.21.2. HTTP Requests
8.21.3. HTTP Load Distribution
8.21.4. HTTP Request Sequences
8.22. HTTP2
8.23. Sametime
8.24. TCP Stream Graphs
8.25. UDP Multicast Streams
8.26. Reliable Server Pooling (RSerPool)
8.27. F5
8.28. IPv4 Statistics
8.29. IPv6 Statistics
9. Telephony
9.1. Introduction
9.2. Playing VoIP Calls
9.2.1. Supported codecs
9.2.2. Work with RTP streams - Playlist
9.2.3. Playing audio during live capture
9.2.4. RTP Decoding Settings
9.2.5. VoIP Processing Performance and Related Limits
9.3. VoIP Calls Window
9.4. ANSI
9.4.1. A-I/F BSMAP Statistics Window
9.4.2. A-I/F DTAP Statistics Window
9.5. GSM Windows
9.6. IAX2 Stream Analysis Window
9.7. ISUP Messages Window
9.8. LTE
9.8.1. LTE MAC Traffic Statistics Window
9.8.2. LTE RLC Graph Window
9.8.3. LTE RLC Traffic Statistics Window
9.9. MTP3 Windows
9.10. Osmux Windows
9.11. RTP
9.11.1. RTP Streams Window
9.11.2. RTP Stream Analysis Window
9.11.3. RTP Player Window
9.12. RTSP Window
9.13. SCTP Windows
9.14. SMPP Operations Window
9.15. UCP Messages Window
9.16. H.225 Window
9.17. SIP Flows Window
9.18. SIP Statistics Window
9.19. WAP-WSP Packet Counter Window
10. Wireless
10.1. Introduction
10.2. Bluetooth ATT Server Attributes
10.3. Bluetooth Devices
10.4. Bluetooth HCI Summary
10.5. WLAN Traffic
11. Customizing Wireshark
11.1. Introduction
11.2. Start Wireshark from the command line
11.3. Packet colorization
11.4. Control Protocol dissection
11.4.1. The “Enabled Protocols” dialog box
11.4.2. User Specified Decodes
11.5. Preferences
11.6. Configuration Profiles
11.7. User Table
11.8. Display Filter Macros
11.9. ESS Category Attributes
11.10. MaxMind Database Paths
11.11. IKEv2 decryption table
11.12. Object Identifiers
11.13. PRES Users Context List
11.14. SCCP users Table
11.15. SMI (MIB and PIB) Modules
11.16. SMI (MIB and PIB) Paths
11.17. SNMP Enterprise Specific Trap Types
11.18. SNMP users Table
11.19. Tektronix K12xx/15 RF5 protocols Table
11.20. User DLTs protocol table
11.21. Protobuf Search Paths
11.22. Protobuf UDP Message Types
12. MATE
12.1. Introduction
12.2. Getting Started
12.3. MATE Manual
12.3.1. Introduction
12.3.2. Attribute Value Pairs
12.3.3. AVP lists
12.3.4. MATE Analysis
12.3.5. About MATE
12.4. MATE’s configuration tutorial
12.4.1. A Gop for DNS requests
12.4.2. A Gop for HTTP requests
12.4.3. Getting DNS and HTTP together into a Gog
12.4.4. Separating requests from multiple users
12.5. MATE configuration examples
12.5.1. TCP session
12.5.2. a Gog for a complete FTP session
12.5.3. using RADIUS to filter SMTP traffic of a specific user
12.5.4. H323 Calls
12.5.5. MMS
12.6. MATE’s configuration library
12.6.1. General use protocols
12.6.2. VoIP/Telephony
12.7. MATE’s reference manual
12.7.1. Attribute Value Pairs
12.7.2. Attribute/Value Pair List (AVPL)
12.8. Configuration AVPLs
12.8.1. Pdsu’s configuration actions
A. Wireshark Messages
A.1. Packet List Messages
A.1.1. [Malformed Packet]
A.1.2. [Packet size limited during capture]
A.2. Packet Details Messages
A.2.1. [Response in frame: 123]
A.2.2. [Request in frame: 123]
A.2.3. [Time from request: 0.123 seconds]
A.2.4. [Stream setup by PROTOCOL (frame 123)]
B. Files and Folders
B.1. Capture Files
B.1.1. Libpcap File Contents
B.1.2. Not Saved in the Capture File
B.2. Configuration File and Plugin Folders
B.2.1. Folders on Windows
B.2.2. Folders on Unix-like systems
B.3. Configuration Files
B.4. Plugin folders
B.5. Windows folders
B.5.1. Windows profiles
B.5.2. Windows roaming profiles
B.5.3. Windows temporary folder
C. Protocols and Protocol Fields
D. Related command line tools
D.1. Introduction
D.2. tshark: Terminal-based Wireshark
D.3. tcpdump: Capturing with “tcpdump” for viewing with Wireshark
D.4. dumpcap: Capturing with “dumpcap” for viewing with Wireshark
D.5. capinfos: Print information about capture files
D.6. rawshark: Dump and analyze network traffic.
D.7. editcap: Edit capture files
D.8. mergecap: Merging multiple capture files into one
D.9. text2pcap: Converting ASCII hexdumps to network captures
D.10. reordercap: Reorder a capture file
13. This Document’s License (GPL)