{"id":3593,"date":"2024-09-06T08:39:58","date_gmt":"2024-09-06T08:39:58","guid":{"rendered":"https:\/\/howtogeek.blog\/ko\/?p=3593"},"modified":"2024-09-06T08:39:58","modified_gmt":"2024-09-06T08:39:58","slug":"optimize-your-network-analysis-with-the-latest-wireshark-version-4-4-0-ko","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/ko\/optimize-your-network-analysis-with-the-latest-wireshark-version-4-4-0-ko\/","title":{"rendered":"\ucd5c\uc2e0 Wireshark \ubc84\uc804 4.4.0\uc73c\ub85c \ub124\ud2b8\uc6cc\ud06c \ubd84\uc11d \ucd5c\uc801\ud654"},"content":{"rendered":"<p><span>\ufeff<\/span><\/p>\n<p>Wireshark\ub294 \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7 \ubd84\uc11d\uae30\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7 \ubd84\uc11d\uae30\ub294 \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7\uc744 \ucea1\ucc98\ud558\uace0 \uac00\ub2a5\ud55c \ud55c \uc790\uc138\ud558\uac8c \ud328\ud0b7 \ub370\uc774\ud130\ub97c \ud45c\uc2dc\ud558\ub824\uace0 \ud569\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7 \ubd84\uc11d\uae30\ub294 \uc804\uae30 \uae30\uc220\uc790\uac00 \uc804\uae30 \ucf00\uc774\ube14 \ub0b4\ubd80\uc5d0\uc11c \ubb34\uc2a8 \uc77c\uc774 \uc77c\uc5b4\ub098\uace0 \uc788\ub294\uc9c0(\ubb3c\ub860 \ub354 \ub192\uc740 \uc218\uc900\uc5d0\uc11c) \uc870\uc0ac\ud558\ub294 \ub370 \uc804\uc555\uacc4\ub97c \uc0ac\uc6a9\ud558\ub294 \uac83\ucc98\ub7fc \ub124\ud2b8\uc6cc\ud06c \ucf00\uc774\ube14 \ub0b4\ubd80\uc5d0\uc11c \ubb34\uc2a8 \uc77c\uc774 \uc77c\uc5b4\ub098\uace0 \uc788\ub294\uc9c0 \uc870\uc0ac\ud558\ub294 \ub370 \uc0ac\uc6a9\ub418\ub294 \uce21\uc815 \uc7a5\uce58\ub77c\uace0 \uc0dd\uac01\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uacfc\uac70\uc5d0\ub294 \uc774\ub7ec\ud55c \ub3c4\uad6c\uac00 \ub9e4\uc6b0 \ube44\uc2f8\uac70\ub098 \ub3c5\uc810\uc801\uc774\uac70\ub098 \ub458 \ub2e4\uc600\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 Wireshark\uc758 \ub4f1\uc7a5\uc73c\ub85c \ubaa8\ub4e0 \uac83\uc774 \ubc14\ub00c\uc5c8\uc2b5\ub2c8\ub2e4. Wireshark\ub294 \uc544\ub9c8\ub3c4 \uc624\ub298\ub0a0 \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \ucd5c\uace0\uc758 \uc624\ud508 \uc18c\uc2a4 \ud328\ud0b7 \ubd84\uc11d\uae30 \uc911 \ud558\ub098\uc77c \uac83\uc785\ub2c8\ub2e4.<\/p>\n<ul>\n<li>\uc218\ubc31 \uac1c\uc758 \ud504\ub85c\ud1a0\ucf5c\uc5d0 \ub300\ud55c \uc2ec\uce35\uc801\uc778 \uac80\uc0ac, \uc9c0\uc18d\uc801\uc73c\ub85c \ucd94\uac00\ub418\ub294 \ud504\ub85c\ud1a0\ucf5c<\/li>\n<li>\ub77c\uc774\ube0c \ucea1\ucc98 \ubc0f \uc624\ud504\ub77c\uc778 \ubd84\uc11d<\/li>\n<li>\ud45c\uc900 3\uac1c \ucc3d \ud328\ud0b7 \ube0c\ub77c\uc6b0\uc800<\/li>\n<li>\ub2e4\uc911 \ud50c\ub7ab\ud3fc: Windows, Linux, OS X, Solaris, FreeBSD, NetBSD \ub4f1 \ub2e4\uc591\ud55c \ud50c\ub7ab\ud3fc\uc5d0\uc11c \uc2e4\ud589\ub429\ub2c8\ub2e4.<\/li>\n<li>\ucea1\ucc98\ub41c \ub124\ud2b8\uc6cc\ud06c \ub370\uc774\ud130\ub294 GUI \ub610\ub294 TTY \ubaa8\ub4dc TShark \uc720\ud2f8\ub9ac\ud2f0\ub97c \ud1b5\ud574 \ucc3e\uc544\ubcfc \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\uc5c5\uacc4\uc5d0\uc11c \uac00\uc7a5 \uac15\ub825\ud55c \ub514\uc2a4\ud50c\ub808\uc774 \ud544\ud130<\/li>\n<li>\ud48d\ubd80\ud55c VoIP \ubd84\uc11d<\/li>\n<li>\ub2e4\uc591\ud55c \ucea1\ucc98 \ud30c\uc77c \ud615\uc2dd\uc744 \uc77d\uace0 \uc501\ub2c8\ub2e4.<\/li>\n<li>gzip\uc73c\ub85c \uc555\ucd95\ub41c \ud30c\uc77c\uc744 \ucea1\ucc98\ud558\uba74 \uc989\uc2dc \uc555\ucd95\uc744 \ud480 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\ub77c\uc774\ube0c \ub370\uc774\ud130\ub294 \uc774\ub354\ub137, IEEE 802.11, PPP\/HDLC, ATM, \ube14\ub8e8\ud22c\uc2a4, USB, \ud1a0\ud070 \ub9c1, \ud504\ub808\uc784 \ub9b4\ub808\uc774, FDDI \ubc0f \uae30\ud0c0(\ud50c\ub7ab\ud3fc\uc5d0 \ub530\ub77c \ub2e4\ub984)\uc5d0\uc11c \uc77d\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>IPsec, ISAKMP, Kerberos, SNMPv3, SSL\/TLS, WEP, WPA\/WPA2\ub97c \ud3ec\ud568\ud55c \ub2e4\uc591\ud55c \ud504\ub85c\ud1a0\ucf5c\uc5d0 \ub300\ud55c \ubcf5\ud638\ud654 \uc9c0\uc6d0<\/li>\n<li>\ud328\ud0b7 \ubaa9\ub85d\uc5d0 \uc0c9\uc0c1 \uaddc\uce59\uc744 \uc801\uc6a9\ud558\uc5ec \ube60\ub974\uace0 \uc9c1\uad00\uc801\uc778 \ubd84\uc11d\uc744 \uc218\ud589\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\ucd9c\ub825\uc740 XML, PostScript\u00ae, CSV \ub610\ub294 \uc77c\ubc18 \ud14d\uc2a4\ud2b8\ub85c \ub0b4\ubcf4\ub0bc \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n<p><strong>Wireshark 4.4.0 \ubcc0\uacbd \ub85c\uadf8:<\/strong><\/p>\n<ul>\n<li>I\/O \uadf8\ub798\ud504, \ud750\ub984 \uadf8\ub798\ud504\/VoIP \ud1b5\ud654, TCP \uc2a4\ud2b8\ub9bc \uadf8\ub798\ud504\ub97c \ud3ec\ud568\ud558\uc5ec \uadf8\ub798\ud504 \ub300\ud654 \uc0c1\uc790\uc5d0 \ub9ce\uc740 \uac1c\uc120 \ubc0f \uc218\uc815 \uc0ac\ud56d\uc774 \uc801\uc6a9\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/li>\n<li>Wireshark\ub294 \uc774\uc81c \uc790\ub3d9 \ud504\ub85c\ud544 \uc804\ud658\uc744 \uc9c0\uc6d0\ud569\ub2c8\ub2e4. \ub514\uc2a4\ud50c\ub808\uc774 \ud544\ud130\ub97c \uad6c\uc131 \ud504\ub85c\ud544\uacfc \uc5f0\uacb0\ud560 \uc218 \uc788\uc73c\uba70, \ud544\ud130\uc640 \uc77c\uce58\ud558\ub294 \ucea1\ucc98 \ud30c\uc77c\uc744 \uc5f4\uba74 Wireshark\uac00 \uc790\ub3d9\uc73c\ub85c \ud574\ub2f9 \ud504\ub85c\ud544\ub85c \uc804\ud658\ud569\ub2c8\ub2e4.<\/li>\n<li>Lua 5.3 \ubc0f 5.4\uc5d0 \ub300\ud55c \uc9c0\uc6d0\uc774 \ucd94\uac00\ub418\uc5c8\uace0 Lua 5.1 \ubc0f 5.2\uc5d0 \ub300\ud55c \uc9c0\uc6d0\uc774 \uc81c\uac70\ub418\uc5c8\uc2b5\ub2c8\ub2e4. Windows \ubc0f macOS \uc124\uce58 \ud504\ub85c\uadf8\ub7a8\uc740 \uc774\uc81c Lua 5.4.6\uacfc \ud568\uaed8 \uc81c\uacf5\ub429\ub2c8\ub2e4.<\/li>\n<li>\uac12 \ubb38\uc790\uc5f4\uc5d0 \ub300\ud55c \ud45c\uc2dc \ud544\ud130 \uc9c0\uc6d0\uc774 \uac1c\uc120\ub418\uc5c8\uc2b5\ub2c8\ub2e4(\uc22b\uc790 \ud544\ub4dc\uc5d0 \ub300\ud55c \uc120\ud0dd\uc801 \ubb38\uc790\uc5f4 \ud45c\ud604).<\/li>\n<li>\ub514\uc2a4\ud50c\ub808\uc774 \ud544\ud130 \uae30\ub2a5\uc740 \ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d\uae30 \ubc0f \ud30c\uc77c \ud30c\uc11c\uc640 \uc720\uc0ac\ud558\uac8c \ud50c\ub7ec\uadf8\uc778\uc73c\ub85c \uad6c\ud604\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\uac01 \ub514\uc2a4\ud50c\ub808\uc774 \ud544\ud130 \ud544\ub4dc\uc5d0 \ud574\ub2f9 pcap \ud544\ud130\uc640 \ub3d9\ub4f1\ud55c \uac83\uc774 \uc788\ub294 \uacbd\uc6b0 \ud3b8\uc9d1 \u203a \ubcf5\uc0ac \u203a \ub514\uc2a4\ud50c\ub808\uc774 \ud544\ud130\ub97c pcap \ud544\ud130\ub85c \ubcc0\ud658\ud558\uc5ec \ub514\uc2a4\ud50c\ub808\uc774 \ud544\ud130\ub97c pcap \ud544\ud130\ub85c \ubcc0\ud658\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\uc0ac\uc6a9\uc790 \uc815\uc758 \uc5f4\uc740 \ub514\uc2a4\ud50c\ub808\uc774 \ud544\ud130 \ud568\uc218, \ud328\ud0b7 \uc2ac\ub77c\uc774\uc2a4, \uc0b0\uc220 \uacc4\uc0b0, \ub17c\ub9ac \ud14c\uc2a4\ud2b8, \uc6d0\uc2dc \ubc14\uc774\ud2b8 \uc8fc\uc18c \uc9c0\uc815, \ud504\ub85c\ud1a0\ucf5c \uacc4\uce35 \uc218\uc815\uc790 \ub4f1\uc758 \uc720\ud6a8\ud55c \ud544\ub4dc \ud45c\ud604\uc2dd\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc815\uc758\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>tshark -e\uc5d0 \ub300\ud55c \uc0ac\uc6a9\uc790 \uc815\uc758 \ucd9c\ub825 \ud544\ub4dc\ub294 \uc720\ud6a8\ud55c \ud544\ub4dc \ud45c\ud604\uc2dd\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc815\uc758\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>Wireshark\ub294 \uc555\ucd95 \ud30c\uc77c \uc9c0\uc6d0\uc744 \uc704\ud574 zlib \ub300\uc2e0 zlib-ng\ub85c \ube4c\ub4dc\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. Zlib-ng\ub294 zlib\ubcf4\ub2e4 \uc0c1\ub2f9\ud788 \ube60\ub985\ub2c8\ub2e4. \uacf5\uc2dd Windows \ubc0f macOS \ud328\ud0a4\uc9c0\uc5d0\ub294 \uc774 \uae30\ub2a5\uc774 \ud3ec\ud568\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\ub2e4\ub978 \ub9ce\uc740 \uac1c\uc120 \uc0ac\ud56d\uc774 \uc774\ub8e8\uc5b4\uc84c\uc2b5\ub2c8\ub2e4. \uc790\uc138\ud55c \ub0b4\uc6a9\uc740 <strong><a href=\"https:\/\/www.wireshark.org\/docs\/relnotes\/wireshark-4.4.0.html\" rel=\"nofollow\">&#8220;\uc0c8\ub86d\uace0 \uc5c5\ub370\uc774\ud2b8\ub41c \uae30\ub2a5&#8221;   \uc139\uc158\uc744 \ucc38\uc870\ud558\uc138\uc694.<\/a><\/strong><\/li>\n<\/ul>\n<p>\ub2e4\uc6b4\ub85c\ub4dc: <a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/Wireshark-4.4.0-x64.exe\" rel=\"nofollow\">Wireshark 4.4.0<\/a> | 83.2MB(\uc624\ud508\uc18c\uc2a4) <br \/>\n\ub2e4\uc6b4\ub85c\ub4dc: <a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/WiresharkPortable64_4.4.0.paf.exe\" rel=\"nofollow\">Portable Wireshark 4.4.0<\/a> | <a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/Wireshark-4.4.0-arm64.exe\" rel=\"nofollow\">ARM64 \uc124\uce58 \ud504\ub85c\uadf8\ub7a8<\/a><br \/> <br \/>\n\ubcf4\uae30: <a href=\"https:\/\/www.wireshark.org\/\" rel=\"nofollow\">Wireshark \uc6f9\uc0ac\uc774\ud2b8<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ufeff Wireshark\ub294 \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7 \ubd84\uc11d\uae30\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7 \ubd84\uc11d\uae30\ub294 \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7\uc744 \ucea1\ucc98\ud558\uace0 \uac00\ub2a5\ud55c \ud55c \uc790\uc138\ud558\uac8c \ud328\ud0b7 \ub370\uc774\ud130\ub97c \ud45c\uc2dc\ud558\ub824\uace0 \ud569\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ud328\ud0b7 \ubd84\uc11d\uae30\ub294 \uc804\uae30 \uae30\uc220\uc790\uac00 \uc804\uae30 \ucf00\uc774\ube14 \ub0b4\ubd80\uc5d0\uc11c \ubb34\uc2a8 \uc77c\uc774 \uc77c\uc5b4\ub098\uace0 \uc788\ub294\uc9c0(\ubb3c\ub860 \ub354 \ub192\uc740 \uc218\uc900\uc5d0\uc11c) \uc870\uc0ac\ud558\ub294 \ub370 \uc804\uc555\uacc4\ub97c \uc0ac\uc6a9\ud558\ub294 \uac83\ucc98\ub7fc \ub124\ud2b8\uc6cc\ud06c \ucf00\uc774\ube14 \ub0b4\ubd80\uc5d0\uc11c \ubb34\uc2a8 \uc77c\uc774 \uc77c\uc5b4\ub098\uace0 \uc788\ub294\uc9c0 \uc870\uc0ac\ud558\ub294 \ub370 \uc0ac\uc6a9\ub418\ub294 \uce21\uc815 \uc7a5\uce58\ub77c\uace0 \uc0dd\uac01\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uacfc\uac70\uc5d0\ub294 \uc774\ub7ec\ud55c [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[143,466,467,468,469,374,344,345,470,471,472],"class_list":["post-3593","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-network","tag-network-analyzer","tag-network-monitoring","tag-network-security","tag-network-traffic","tag-open-source","tag-soft","tag-software","tag-wifi-capture","tag-wifi-scanner","tag-wireshark"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/posts\/3593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/comments?post=3593"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/posts\/3593\/revisions"}],"predecessor-version":[{"id":3594,"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/posts\/3593\/revisions\/3594"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/media?parent=3593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/categories?post=3593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/ko\/wp-json\/wp\/v2\/tags?post=3593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}