Click here to Skip to main content
15,907,497 members
Articles / Desktop Programming / MFC

Creating Your Own Custom Wireshark Dissector

Rate me:
Please Sign up or sign in to vote.
4.80/5 (30 votes)
22 Jul 2007CPOL15 min read 818.5K   6.1K   128   89
This article describes how to create a Wireshark dissector as well as how to setup the Wireshark build environment.

Sample Image - maximum width is 600 pixels

1.0 Introduction

Wireshark is a powerful open source tool used to dissect Ethernet packets. Have you ever wondered what it takes to implement your own custom dissector? Furthermore, have you attempted to learn Wireshark's API and found it difficult to understand? This article will attempt to demystify the development of your very own protocol dissector. This article uses Amin Gholiha's "A Simple IOCP Server/Client class" [^] as a basis for dissection, thus producing the AMIN protocol.

1.1 Requirements

  • This article expects the reader to be familiar with structured C, TCP/IP.
  • The source code has been designed to compile on Windows. A Linux version of this article may be produced at another time.
  • A basic knowledge of how to use Wireshark to capture packets.
  • A C++ compiler. VS2005/VS2003/VC++6/VS2005EE.

2.0 Configure Wireshark Build Environment (Win32)

The Wireshark developer's guide [^] features a section on setting up the Win32 environment, which I found to be invaluable. This section will paraphrase much of the information found there.

Step 1. C Compiler

If you do not have VS2005/VS2003 etc., you will need to download and install "Visual C++ 2005 Express Edition"[^].

Step 2. Platform SDK

You must download and install the Platform SDK Server 2003 R2[^].

Step 3. Install Cygwin

This guide will not go into great details about the Cygwin package. In short, it allows Wireshark to be compiled on Windows and Linux – which is quite a feat.
Download the Cygwin installer and start it.

At the "Select Packages" page, you will need to select some additional packages which are not installed by default. Navigate to the required Category/Package row, and click on the "Skip" item in the "New" column so it shows a version number for:

  • Archive/unzip
  • Devel/bison
  • Devel/flex
  • Interpreters/perl
  • Utils/patch
  • Web/wget

cygwin install image

After clicking the Next button several times, the setup will then download and install the selected packages (this may take a while).

Step 4. Install Python

Get the Python 2.4 installer and install Python into the default location. Note: Python 2.5 doesn't work out of the box, so avoid it.

Step 5. Install Subversion Client

Subversion is not required to build Wireshark, but it is required to follow this article. Subversion allows you to grab the latest source to work with.

My personal choice for a subversion client is TortoiseSVN[^]. Download and install TortoiseSVN[^]. You may need to reboot after the installation to enable the context menu options. This is a pretty nifty feature that lets you right-click on folders in the "explorer" view and grab a source tree.

tortoisesvn image

Step 6. Get the Latest Wireshark Source

You may be wondering at this point why you are getting the entire source tree just to make a dissector. The source tree contains the "plugins" directories that contain examples and a place to build your dissector.

  1. Right-click on the C:\ drive in Windows Explorer.
  2. In the upcoming context menu, select "SVN checkout.." and then set:
  3. The URL of the repository to
  4. The checkout directory to c:\wireshark.
  5. tortoisesvn checkout image

  6. Select OK. You may be prompted to create the Wireshark directory. Select Yes.
  7. TortoiseSVN starts downloading the source.
  8. If the download fails, you may be behind a restrictive firewall. In this case, you better find an alternate way to get the source tree. (You are welcome to email me a request.)

Step 7. Edit the config.nmake

Open C:\Wireshark\config.nmake using Notepad or your favorite text editor. The following sections must be updated:

  • VERSION_EXTRA: Give Wireshark your "private" version info. E.g.: -myprotocol123. Mine reads: SVN-AMINPROTOCOL. You are welcome to put whatever you wish here.
  • PROGRAM_FILES: Where your programs resides. Usually, just keep the default.
  • MSCV_VARIANT: This part is critical. If your compiler isn't uncommented by default, you must comment out the current selection and uncomment your own. For example:
  • # "Microsoft Visual Studio 6.0" - RECOMMENDED
    # Visual C++ 6.0, _MSC_VER 1200, msvcrt.dll (version 6)
    # "Microsoft Visual Studio .NET (2002)" - WORKS
    # Visual C++ 7.0, _MSC_VER 1300, msvcr70.dll
    # "Microsoft .Net Framework SDK Version 1.0" - WORKS
    # needs additional Platform SDK installation
    # Visual C++ 7.0, _MSC_VER 1300, msvcr70.dll
    # "Microsoft Visual Studio .NET 2003" - WORKS
    # Visual C++ 7.1, _MSC_VER 1310, msvcr71.dll
    # "Microsoft .Net Framework SDK Version 1.1" - WORKS
    # needs additional Platform SDK installation
    # Visual C++ 7.1, _MSC_VER 1310, msvcr71.dll
    # "Microsoft Visual Studio 2005" - WORKS
    # Visual C++ 8.0, _MSC_VER 1400, msvcr80.dll
    MSVC_VARIANT=MSVC2005    <------ This is my compiler. All others are commented out.
    # "Microsoft Visual C++ 2005 Express Edition" - WORKS
    # needs additional Platform SDK installation
    # Visual C++ 8.0, _MSC_VER 1400, msvcr80.dll
    # "Microsoft .Net Framework 2.0 SDK" - WORKS
    # needs additional Platform SDK installation
    # Visual C++ 8.0, _MSC_VER 1400, msvcr80.dll

Step 8. Prepare cmd.exe

  1. Start cmd.exe (Start > Run > "cmd")
  2. Call "C:\Program Files\Microsoft Platform SDK for Windows Server 2003 R2\SetEnv.Cmd"
  3. Call "C:\Program Files\Microsoft Visual Studio 8\VC\bin\vcvars32.bat"
  4. cd c:\wireshark

Your paths may be slightly different depending on the compiler you use. In the example zip file, you will find a step1.bat, step2.bat, and a step3.bat. I made these batch files to simplify this step. I know there are more fancy ways of constructing the batch files, so please feel free to submit your own.

Step 9. Verify Tools are Installed

From the C:\WireShark directory, execute:

C:\wireshark> Nmake –f Makefile.nmake verify_tools

Your output should look like:

cl: /cygdrive/c/Programme/Microsoft Visual Studio 8/VC/BIN/cl
link: /cygdrive/c/Programme/Microsoft Visual Studio 8/VC/BIN/link
nmake: /cygdrive/c/Programme/Microsoft Visual Studio 8/VC/BIN/nmake
bash: /usr/bin/bash
bison: /usr/bin/bison
flex: /usr/bin/flex
env: /usr/bin/env
grep: /usr/bin/grep
/usr/bin/find: /usr/bin/find
perl: /usr/bin/perl
env: /usr/bin/env
C:/python24/python.exe: /cygdrive/c/python24/python.exe
sed: /usr/bin/sed
unzip: /usr/bin/unzip
wget: /usr/bin/wget

If something is missing, you may have to repeat the Cygwin install.

Step 10. Install Libraries

If you have closed your cmd.exe, you will have to reopen it and execute Step 8. You can use the step1, step2, step3 batch files to simplify the process. From C:\Wireshark, execute:

nmake –f Makefile.nmake setup (This step may take a little while to complete.)

nmake –f Makefile.nmake distclean

Step 11. Build Wireshark

If you have closed your cmd.exe, you will have to reopen it and execute Step 8. You can use the step1, step2, step3 batch files to simplify the process.

nmake –f Makefile.nmake all  (this step will take quite a while to complete)

You're done; provided the above steps worked!

Step 12. (Optional) Create a Wireshark Installer

I like the idea of distributing my version to friends. You can easily create an installer by doing the following:

  1. Download and install NSIS [^].
  2. Download vcredist_x86.exe [^] and place it in the c:\wireshark-win32\libs directory. You may already have it in the directory, so check first.
  3. Using the command line, prepare it using Step 8 or the Step1/2/3 batch files provided, and from C:\Wireshark, execute:
  4. nmake –f Makefile.nmake packaging
  5. You should now have a c:\wireshark\packaging\nsis\wireshark-setup<version>.exe. Try it out!

3.0 Execute the Compiled Wireshark

To launch Wireshark, you simply can run C:\wireshark\wireshark-gtk2\wireshark.exe and check if it starts. I found that I needed to download and install Wireshark before my build worked. This is probably due to not having WinPcap installed prior. You can download and install Wireshark from here.

Note: If you are using Visual Studio 2005, you will have to use your build of Wireshark to test the dissector. For some reason, compiling dissector plug-ins with Visual Studio 2005 prevents their use in the mainstream release of Wireshark. If you are using a different compiler, you may not have to use the compiled version of Wireshark.

4.0 Understanding the AMIN Protocol

Amin was nice enough to code up an excellent IOCP client/server example. His code uses a very simple protocol to transmit data via TCP. This article is designed for the beginner, so we will only be dissecting the text messages sent from the client/server. The file transfer messages are a tad more complex, so we will ignore those for now.

amin packet structure

4.1 Package Length Prefix

All of Amin's packets are prefixed with a four (4) byte long value which indicates the size of the package. This value is presented in network order over the wire, or, MSB. Network order means that the bytes are ordered in such a way that the most significant bytes are first. For example, let's say your length is 12 decimal. This would be 0x0000000c in hex (if you are storing the value in a long). If you read this value off the "wire", it would appear as 0c 00 00 00; this is "Network" order. You may be wondering why the bytes are reversed. If you think about it as an array of bytes, instead of a long, each byte is written in order. In this case, byte[0] is 0x0c, so it's written first. This is an important concept to understand.

When we use Wireshark to dissect the packet, it is important to understand that 2 and 4 byte integer values are always written in "Network" order, or LSB. In other protocols, the order may be Host – which would be LSB.

Note: The length accounts for the bytes to follow, meaning that the four (4) bytes which represent the length value are not included. For example, if you sent a packet that has 12 characters of text, the length would be 12+1 = 13 (the one byte is the type), as opposed to 12+1+4 = 17.

4.2 Type

Amin follows the length prefix with a byte that indicates the "type" of the packet he is delivering. We will only be dealing with type 0x00, which is text. Note: a single byte is not subject to byte order because it's a single byte.

4.3 Null Terminated String

This field is simply a null terminated string which can be entered into Amin's MFC GUI. The default string is 'ABCDEFGHIJKLMNOPQRST123456789'.

5.0 Examining the AMIN protocol in Wireshark without a custom dissector

You can download the Simple IOCP Client/Server written by Amin here. Note: This article does not discuss the basic use of Wireshark. This article assumes you have used it before and understand how to use it in a basic sense. Here is what Wireshark looks like without a dissector for the AMIN protocol:


Notice that we are simply given a field called "Data". Within the data portion, we can recognize our AMIN protocol based on the "1f 00 00 00 00" package length. The type follows, and after that is the "ABC.." ASCII.

6.0 Writing Your Own Dissector

The Wireshark source tree contains a directory called Plugins, which provides a reasonable amount of examples. However, it was impossible to find a really "simple" example to use. So, in combination with the H223 dissector, random examples from the internet, and the developer guide, I have prepared a simple example and placed it in the source zip file. The example can be found in the AMIN\ directory.

6.1 The make Files

In order to compile your own protocol, you must create a set of files to compile your dissector. The easiest thing to do is take the following files from the AMIN\ directory in the source zip file.

  • - This is the UNIX/Linux makefile template
  • Makefile.common - This contains the file names of this plug-in
  • Makefile.nmake - This contains the Wireshark plug-in makefile for Windows
  • moduleinfo.h - This contains the plug-in version info
  • moduleinfo.nmake - This contains the DLL version info for Windows
  • packet-amin.c - This is your dissector source
  • - This contains the DLL resource template for Windows

Once you have copied the files into C:\Wireshark\plugins\yourprotocolname, you can begin editing them.

  1. Change all occurrences of AMIN to your protocol name. Be sure to maintain capitalization. Lines: 42, 43, 114.
  2. In Makefile.common, change all occurrences of AMIN to your protocol name. Be sure to maintain capitalization. Line: 31.
  3. In moduleinfo.h, change all occurrences of AMIN to your protocol name. Be sure to maintain capitalization. Line: 8. On line 16, you can change the version to your own. This can be helpful if you plan to distribute your dissector.
  4. In moduleinfo.nmake, change all occurrences of AMIN to your protocol name. Be sure to maintain capitalization on Line 6. Lines 9, 10, 11, & 12 should be changed to reflect the version in moduleinfo.h, Line: 16.
  5. In packet-amin.c, the first thing to do is change it so it reads packet-yourprotocol.c. All dissectors feature this convention, packet-protocolname.c. In the source file, you can simply do a "find and replace" for "amin". However, make sure that you replace the "AMIN" and "amin" references individually. In one case, you cannot submit the filter name in caps, and it will fail when you run Wireshark. Pay very close attention here.
  6. You're done renaming things for now; now, on to the actual code!

7.0 Your Dissector Code

You can use a text editor of your choice to open packet-yourprotocol.c. Let's take it line by line:

# include "config.h"

#include <stdio.h>
#include <glib.h>
#include <epan/packet.h>
#include <string.h>

All dissectors use some standard headers. You need the config.h, glib.h, and packet.h for sure.

#define PROTO_TAG_AMIN    "AMIN"

I like to avoid hard coding constants when I can.

/* Wireshark ID of the AMIN protocol */
static int proto_amin = -1;

This value is very important to Wireshark. Wireshark uses this to identify our protocol.

/* These are the handles of our subdissectors */
static dissector_handle_t data_handle=NULL;
static dissector_handle_t amin_handle;

The dissector handle is what Wireshark uses to reference this dissector.

void dissect_amin(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree);

This is a forward declaration of our dissection function. We will pass this function to a registration function later on.

static int global_amin_port = 999;

This is the port that Wireshark will use to determine if the packet belongs to the AMIN protocol.

static const value_string packettypenames[] = {
    { 0, "TEXT" },
    { 1, "SOMETHING_ELSE" },
    { 0, NULL }

Here is where we add some optional text strings representing packet types. You can define many of these depending on the needs of your own protocol. It adds a level of detail that makes the dissector look well thought out.

static gint hf_amin = -1;
static gint hf_amin_header = -1;
static gint hf_amin_length = -1;
static gint hf_amin_type = -1;
static gint hf_amin_text = -1;

/* These are the ids of the subtrees that we may be creating */
static gint ett_amin = -1;
static gint ett_amin_header = -1;
static gint ett_amin_length = -1;
static gint ett_amin_type = -1;
static gint ett_amin_text = -1;

These allow us to attach IDs to the subcomponents of our protocol.

void proto_reg_handoff_amin(void)
    static gboolean initialized=FALSE;

    if (!initialized) {
        data_handle = find_dissector("data");
        amin_handle = create_dissector_handle(dissect_amin, proto_amin);
        dissector_add("tcp.port", global_amin_port, amin_handle);

This function is called to register our protocol. Notice how the port and dissector handle are passed.

void proto_register_amin (void)
    /* A header field is something you can search/filter on.
    * We create a structure to register our fields. It consists of an
    * array of hf_register_info structures, each of which are of the format
    * {&(field id), {name, abbrev, type, display, strings, bitmask, blurb, HFILL}}.
    static hf_register_info hf[] = {
        { &hf_amin,
        { "Data", "", FT_NONE, BASE_NONE, NULL, 0x0,
        "AMIN PDU", HFILL }},
        { &hf_amin_header,
        { "Header", "amin.header", FT_NONE, BASE_NONE, NULL, 0x0,
         "AMIN Header", HFILL }},
        { &hf_amin_length,
        { "Package Length", "amin.len", FT_UINT32, BASE_DEC, NULL, 0x0,
        "Package Length", HFILL }},
        { &hf_amin_type,
        { "Type", "amin.type", FT_UINT8, BASE_DEC, VALS(packettypenames), 0x0,
         "Package Type", HFILL }},
        { &hf_amin_text,
        { "Text", "amin.text", FT_STRING, BASE_NONE, NULL, 0x0,
         "Text", HFILL }} 

The array above defines what elements we will be displaying. These declarations are simply a definition Wireshark uses to determine the data type, when we later dissect the packet.

static gint *ett[] = {

The array above simply attaches IDs to our definitions. Notice the 1:1 relationship of the hf_ and ett_ data types.

proto_amin = proto_register_protocol ("AMIN Protocol", "AMIN", "amin");

proto_register_field_array (proto_amin, hf, array_length (hf));
proto_register_subtree_array (ett, array_length (ett));
register_dissector("amin", dissect_amin, proto_amin);

The above code registers our protocol. In most of the examples I saw, they check to see if proto_amin is initialized already. However, a developer from the mailing list, "Jaap", emailed me saying it was not needed and confused the initalization process. The subsequent calls register our protocol and data handles.

static void
dissect_amin(tvbuff_t *tvb, packet_info *pinfo, proto_tree *tree)

The dissect function is used to actually dissect and display the packet details.

First, some points are initialized to trees/items:

proto_item *amin_item = NULL;
proto_item *amin_sub_item = NULL;
proto_tree *amin_tree = NULL;
proto_tree *amin_header_tree = NULL;
guint16 type = 0;

This next call checks to see if the INFO column is displaying our "AMIN" tag. If it's not, then we supply it.

    if (check_col(pinfo->cinfo, COL_PROTOCOL))
        col_set_str(pinfo->cinfo, COL_PROTOCOL, PROTO_TAG_AMIN);
    /* Clear out stuff in the info column */

//Here we check to see if the INFO column is present. If it is we output 
//which ports the packet came from and went to. Also, we indicate the type 
//of packet.

    // This is not a good way of dissecting packets. The tvb length should
    // be sanity checked so we aren't going past the actual size.

    type = tvb_get_uint8( tvb, 4 ); // Get the type byte

    if (check_col(pinfo->cinfo, COL_INFO)) {
         col_add_fstr(pinfo->cinfo, COL_INFO, "%d > %d Info Type:[%s]",
         pinfo->srcport, pinfo->destport, 
         val_to_str(type, packettypenames, "Unknown Type:0x%02x"));

If there is a "tree" requested, we handle that request.

if (tree) { /* we are being asked for details */
    guint32 offset = 0;
    guint32 length = 0;

This call adds our tree to the main dissection tree.

amin_item = proto_tree_add_item(tree, proto_amin, tvb, 0, -1, FALSE);
amin_tree = proto_item_add_subtree(amin_item, ett_amin);
amin_header_tree = proto_item_add_subtree(amin_item, ett_amin);

amin_sub_item = proto_tree_add_item( amin_tree, hf_amin_header,
                tvb, offset, -1, FALSE );

Here, we add our own subtree, so we can have a "header" collapsible branch. Following the subtree, we copy out the length bytes to our data type. The order of the long value representing length is "network" order. If someone has a more appropriate tvb_get call to read the length value, it would be appreciated.

amin_header_tree = proto_item_add_subtree(amin_sub_item, ett_amin);

//We use tvb_memcpy to get our length value out (Host order)

tvb_memcpy(tvb, (guint8 *)&length, offset, 4);
proto_tree_add_uint(amin_header_tree, hf_amin_length, tvb, offset, 4, length);

//We increment the offset to get past the 4 bytes indicating length

//Here we submit the type parameter to the tree. 
proto_tree_add_item(amin_header_tree, hf_amin_type, tvb, offset, 1, FALSE);
type = tvb_get_guint8( tvb, offset ); // Get our type byte


//If the type is TEXT, we add the text to the tree. 

if( type == 0 )
    proto_tree_add_item( amin_tree, hf_amin_text, tvb, offset, length-1, FALSE );

7.1 Compiling packet-yourprotocol.c

If your command line window is still open, you can use that, or use step1/2/3.bat to arrive at the c:\wireshark\plugins\yourprotocol directory. If you are building my source code, you should be at c:\wireshark\plugins\amin. From the "prepared" command line, see Step 8. Execute:

nmake -f Makefile.nmake distclean
nmake -f Makefile.nmake all 

If the build succeeds, you should have a yourprotocol.dll. Simply copy this file to your C:\WireShark\wireshark-gtk2\plugins\0.99.7-YOUR-BUILD directory. There should be a bunch of other dissector DLLs present there. You may need to copy it to your c:\program files\wireshark\plugins\0.99.7-YOUR-BUILD directory if you installed it there. The bottom line is to copy it in the appropriate directory based on how you are launching Wireshark. At this point, you should be able to launch Wireshark and dissect packets. A good test is to enter "yourprotocol" in the "filter" area of Wireshark and see if a green or red background forms. A green background, just like in the screenshots of this article, indicates that the dissector loaded correctly.

amin dissected

This is a screen capture of the AMIN protocol being dissected by Wireshark.

8.0 Tips

8.1 CodeBase

I found an immense amount of examples in a searchable form at CodeBase[^]. Without this site, it would have been a much more difficult task locating functions for dissection. Someone really should spend time documenting the Wireshark API in a more formal manner.

A coworker informed me that CodeBase is a pay service. I was able to get into CodeBase beta without having to authenticate. Use this link to do the same (use the search box to find undocumented methods).

8.2 Wireshark Filtering

After you've defined your data type map, you can use the '.' operator to limit the packets being displayed. For example, amin.type==0 will only show packets where the type equals zero.

8.3 Other Examples

There are far more complex examples that can be found in the plugins directory. My suggestion is to check out the H223 dissector. Topics such as TCP segmentation are covered, as well as managing states across combinations of packets (i.e., watching a SIP session throughout multiple packets).

8.4 Capture Loopback Packets

If you wish to locally capture packets using Wireshark, i.e.,, you must perform a few extra steps. I found this link which helps solve the problem. The required steps, per the site suggestion, are:

  1. Install a loopback adapter. Windows 2003[^], Windows XP[^], Windows 2000[^]
  2. Go to MS Loopback adapter properties, set:
    • IP
    • MASK
    • Adapter/additional/network address: 55-55-55-55-55-55
  3. From the command line (cmd.exe):
  4. arp -s 55-55-55-55-55-55


    route add mask

    You can then test the capture by executing:


9.0 Conclusion

Once the complexity has been removed from designing dissectors, it's quite easy to make your very own protocol present in Wireshark. In addition, the guys at Wireshark greatly appreciate those who take the time to legally reverse engineer protocols for inclusion within the Wireshark distribution.

10.0 References

11.0 History

  • July 22, 2007 - Fixed a typo in packet-amin.c: tvb_get_uint8 -> tvb_get_guint8. Thanks Keith!
  • July 9, 2007 - Added a CodeBase link that allows you to search without being a member of CodeBase. Not sure if this is legal, send me an email if it isn't.
  • July 3, 2007 - Removed extra "nmake Makefile.nmake setup" in tools installation section.
  • July 2, 2007 - Updated source code and article to reflect suggestions made by Jaap. Changes include:
    • Changed static int intialized=FALSE to static gboolean.
    • Removed #include <gmodule.h>, not needed.
    • Commented out if(proto_amin == -1){}.
    • Moved the if(check_col(pinfo->cinfo, COLINFO)){ routine out of if(tree).
    • Fixed comments on network versus host byte order.
    • Added section 8.4 on capturing loopback packets.
  • July 1, 2007 - Spell checking and other grammatical corrections. Fixed an issue with packettypename[] where {0,NULL} was required to avoid a seg fault. Thank you Ronnie.
  • June 29, 2007 – First draft.


This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)

Written By
Software Developer (Senior) EXACOM, Inc.
United States United States
Ken Thompson is a programmer working for EXACOM, Inc. Exacom is a telecommunications engineering firm specializing in public safety applications.

Ken graduated from University of New Hampshire with a B.S. in Electrical Engineering Technology.

Ken has been working in the telecommunications field since 1999. Since then he has been programming in C++ and with the advent of .NET an occasional C# application.


Comments and Discussions

QuestionStep 7 Pin
Member 1379450323-Apr-18 11:17
Member 1379450323-Apr-18 11:17 
QuestionStep 7 Pin
Member 1379450323-Apr-18 11:17
Member 1379450323-Apr-18 11:17 
QuestionCreating customized Wireshark dissector for customers Pin
Netwurke - Wireshark dissectors24-Oct-14 3:25
Netwurke - Wireshark dissectors24-Oct-14 3:25 
GeneralMy vote of 5 Pin
kazbeel21-Jun-12 5:28
kazbeel21-Jun-12 5:28 
QuestionTranslate __int64 FileTime UTC from 1601 format to DateTime UTC since 1970 Pin
Member 90382346-Jun-12 23:27
Member 90382346-Jun-12 23:27 
QuestionWhen I make a change to packet_ppp.c,I get strange build error!Please Pin
cpluspluswiser22-Aug-11 23:41
cpluspluswiser22-Aug-11 23:41 
AnswerRe: When I make a change to packet_ppp.c,I get strange build error!Please Pin
ewasta24-Aug-11 5:48
ewasta24-Aug-11 5:48 
QuestionTrouble getting tools setup Pin
Sid Price29-Jun-11 10:33
Sid Price29-Jun-11 10:33 
AnswerRe: Trouble getting tools setup Pin
avr9895-Jan-12 10:58
avr9895-Jan-12 10:58 
GeneralRe: Trouble getting tools setup Pin
RabidCicada14-Feb-12 8:57
RabidCicada14-Feb-12 8:57 
QuestionGood Job - How to be prepared for Sub-Dissectors Pin
tria131224-May-11 4:36
tria131224-May-11 4:36 
GeneralMy vote of 5 Pin
Harshakgowda17-Nov-10 6:56
Harshakgowda17-Nov-10 6:56 
QuestionDo I need to install developer version of Wireshark for this? Pin
Geodepe12-Nov-10 11:04
Geodepe12-Nov-10 11:04 
Generallookfor the codes of IOCP client/server example Pin
a41406531030-May-10 23:07
a41406531030-May-10 23:07 
Generalamin packets Pin
bongani24724-Mar-10 0:43
bongani24724-Mar-10 0:43 
GeneralRe: amin packets Pin
Sathya Anandan16-Apr-10 7:21
Sathya Anandan16-Apr-10 7:21 
NewsCustom Dissector Manifest / Couldn't load module Pin
frumpenpuff19-Jan-10 3:10
frumpenpuff19-Jan-10 3:10 
QuestionHow to add custom dissector in to wireshark package. Pin
Divyang Mithaiwala1-Jan-10 1:49
Divyang Mithaiwala1-Jan-10 1:49 
QuestionExample capture file? Pin
Don Washburn11-Nov-09 2:13
Don Washburn11-Nov-09 2:13 
GeneralWireshark libraries downloads timing out. Pin
Gill Bonner29-Sep-09 5:01
Gill Bonner29-Sep-09 5:01 
QuestionHow the Wireshark recognize the protocol without using port number? Pin
mycuti11-Aug-09 5:56
mycuti11-Aug-09 5:56 
AnswerRe: How the Wireshark recognize the protocol without using port number? Pin
cocaf30-Oct-09 5:20
professionalcocaf30-Oct-09 5:20 
Generaldebugging plugin in VS 2008 Pin
rajeshkatragadda21-Jul-09 11:16
rajeshkatragadda21-Jul-09 11:16 
GeneralRe: debugging plugin in VS 2008 Pin
cocaf30-Oct-09 5:33
professionalcocaf30-Oct-09 5:33 
Generalcatch start/stop capture Pin
oraytman23-Feb-09 12:02
oraytman23-Feb-09 12:02 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.