{"id":3587,"date":"2024-09-06T08:41:56","date_gmt":"2024-09-06T08:41:56","guid":{"rendered":"https:\/\/howtogeek.blog\/zh\/?p=3587"},"modified":"2024-09-06T08:41:56","modified_gmt":"2024-09-06T08:41:56","slug":"optimize-your-network-analysis-with-the-latest-wireshark-version-4-4-0-zh-tw","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/zh\/optimize-your-network-analysis-with-the-latest-wireshark-version-4-4-0-zh-tw\/","title":{"rendered":"\u4f7f\u7528\u6700\u65b0\u7684 Wireshark 4.4.0 \u7248\u672c\u512a\u5316\u60a8\u7684\u7db2\u8def\u5206\u6790"},"content":{"rendered":"<p><span>\ufeff<\/span><\/p>\n<p>Wireshark \u662f\u4e00\u500b\u7db2\u8def\u5c01\u5305\u5206\u6790\u5668\u3002\u7db2\u8def\u5c01\u5305\u5206\u6790\u5668\u5c07\u5617\u8a66\u64f7\u53d6\u7db2\u8def\u5c01\u5305\u4e26\u5617\u8a66\u76e1\u53ef\u80fd\u8a73\u7d30\u5730\u986f\u793a\u8a72\u5c01\u5305\u8cc7\u6599\u3002\u60a8\u53ef\u4ee5\u5c07\u7db2\u8def\u8cc7\u6599\u5305\u5206\u6790\u5668\u8996\u70ba\u4e00\u7a2e\u6e2c\u91cf\u8a2d\u5099\uff0c\u7528\u65bc\u6aa2\u67e5\u7db2\u8def\u96fb\u7e9c\u5167\u90e8\u767c\u751f\u7684\u60c5\u6cc1\uff0c\u5c31\u50cf\u96fb\u5de5\u4f7f\u7528\u96fb\u58d3\u8868\u6aa2\u67e5\u96fb\u7e9c\u5167\u90e8\u767c\u751f\u7684\u60c5\u6cc1\u4e00\u6a23\uff08\u7576\u7136\uff0c\u662f\u5728\u66f4\u9ad8\u7684\u7d1a\u5225\uff09 \uff09\u3002\u904e\u53bb\uff0c\u9019\u985e\u5de5\u5177\u8981\u4e48\u975e\u5e38\u6602\u8cb4\uff0c\u8981\u4e48\u662f\u5c08\u6709\u7684\uff0c\u6216\u8005\u5169\u8005\u517c\u800c\u6709\u4e4b\u3002\u7136\u800c\uff0c\u96a8\u8457 Wireshark \u7684\u51fa\u73fe\uff0c\u4e00\u5207\u90fd\u6539\u8b8a\u4e86\u3002 Wireshark \u53ef\u80fd\u662f\u7576\u4eca\u6700\u597d\u7684\u958b\u6e90\u8cc7\u6599\u5305\u5206\u6790\u5668\u4e4b\u4e00\u3002<\/p>\n<ul>\n<li>\u6df1\u5165\u6aa2\u67e5\u6578\u767e\u500b\u5354\u8b70\uff0c\u4e26\u4e14\u4e00\u76f4\u5728\u6dfb\u52a0\u66f4\u591a\u5354\u8b70<\/li>\n<li>\u5373\u6642\u6355\u7372\u548c\u96e2\u7dda\u5206\u6790<\/li>\n<li>\u6a19\u6e96\u4e09\u7a97\u683c\u8cc7\u6599\u5305\u700f\u89bd\u5668<\/li>\n<li>\u591a\u5e73\u53f0\uff1a\u53ef\u5728 Windows\u3001Linux\u3001OS X\u3001Solaris\u3001FreeBSD\u3001NetBSD \u7b49\u4e0a\u57f7\u884c<\/li>\n<li>\u64f7\u53d6\u7684\u7db2\u8def\u8cc7\u6599\u53ef\u4ee5\u900f\u904e GUI \u6216 TTY \u6a21\u5f0f TShark \u5be6\u7528\u7a0b\u5f0f\u700f\u89bd<\/li>\n<li>\u696d\u754c\u6700\u5f37\u5927\u7684\u986f\u793a\u904e\u6ffe\u5668<\/li>\n<li>\u8c50\u5bcc\u7684 VoIP \u5206\u6790<\/li>\n<li>\u8b80\/\u5beb\u8a31\u591a\u4e0d\u540c\u7684\u64f7\u53d6\u6a94\u6848\u683c\u5f0f<\/li>\n<li>\u4f7f\u7528 gzip \u58d3\u7e2e\u7684\u64f7\u53d6\u6a94\u6848\u53ef\u4ee5\u5373\u6642\u89e3\u58d3\u7e2e<\/li>\n<li>\u53ef\u4ee5\u5f9e\u4e59\u592a\u7db2\u8def\u3001IEEE 802.11\u3001PPP\/HDLC\u3001ATM\u3001\u85cd\u7259\u3001USB\u3001\u4ee4\u724c\u74b0\u3001\u5e40\u4e2d\u7e7c\u3001FDDI \u7b49\uff08\u53d6\u6c7a\u65bc\u60a8\u7684\u5e73\u53f0\uff09\u8b80\u53d6\u5373\u6642\u6578\u64da<\/li>\n<li>\u652f\u63f4\u591a\u7a2e\u5354\u5b9a\u7684\u89e3\u5bc6\uff0c\u5305\u62ec IPsec\u3001ISAKMP\u3001Kerberos\u3001SNMPv3\u3001SSL\/TLS\u3001WEP \u548c WPA\/WPA2<\/li>\n<li>\u8457\u8272\u898f\u5247\u53ef\u4ee5\u61c9\u7528\u65bc\u8cc7\u6599\u5305\u5217\u8868\uff0c\u4ee5\u9032\u884c\u5feb\u901f\u3001\u76f4\u89c0\u7684\u5206\u6790<\/li>\n<li>\u8f38\u51fa\u53ef\u4ee5\u532f\u51fa\u70ba XML\u3001PostScript\u00ae\u3001CSV \u6216\u7d14\u6587\u5b57<\/li>\n<\/ul>\n<p><strong>Wireshark 4.4.0 \u8b8a\u66f4\u65e5\u8a8c\uff1a<\/strong><\/p>\n<ul>\n<li>\u5c0d\u5716\u5f62\u5c0d\u8a71\u65b9\u584a\u9032\u884c\u4e86\u8a31\u591a\u6539\u9032\u548c\u4fee\u5fa9\uff0c\u5305\u62ec I\/O \u5716\u5f62\u3001\u6d41\u7a0b\u5716\/VoIP \u901a\u8a71\u548c TCP \u6d41\u7a0b\u5716\u3002<\/li>\n<li>Wireshark \u73fe\u5728\u652f\u63f4\u81ea\u52d5\u8a2d\u5b9a\u6a94\u5207\u63db\u3002\u60a8\u53ef\u4ee5\u5c07\u986f\u793a\u904e\u6ffe\u5668\u8207\u8a2d\u5b9a\u6a94\u95dc\u806f\u8d77\u4f86\uff0c\u7576\u60a8\u958b\u555f\u8207\u904e\u6ffe\u5668\u76f8\u7b26\u7684\u64f7\u53d6\u6a94\u6848\u6642\uff0cWireshark \u5c07\u81ea\u52d5\u5207\u63db\u5230\u8a72\u8a2d\u5b9a\u6a94\u3002<\/li>\n<li>\u589e\u52a0\u4e86\u5c0d Lua 5.3 \u548c 5.4 \u7684\u652f\u6301\uff0c\u4e26\u522a\u9664\u4e86\u5c0d Lua 5.1 \u548c 5.2 \u7684\u652f\u6301\u3002 Windows \u548c macOS \u5b89\u88dd\u7a0b\u5f0f\u73fe\u5728\u96a8\u9644 Lua 5.4.6\u3002<\/li>\n<li>\u6539\u9032\u4e86\u5c0d\u503c\u5b57\u5143\u5b57\u4e32\u7684\u986f\u793a\u904e\u6ffe\u5668\u652f\u63f4\uff08\u6578\u5b57\u6b04\u4f4d\u7684\u53ef\u9078\u5b57\u4e32\u8868\u793a\u5f62\u5f0f\uff09\u3002<\/li>\n<li>\u986f\u793a\u904e\u6ffe\u5668\u529f\u80fd\u53ef\u4ee5\u4f5c\u70ba\u63d2\u4ef6\u5be6\u73fe\uff0c\u985e\u4f3c\u65bc\u5354\u5b9a\u89e3\u6790\u5668\u548c\u6a94\u6848\u89e3\u6790\u5668\u3002<\/li>\n<li>\u5982\u679c\u6bcf\u500b\u986f\u793a\u904e\u6ffe\u5668\u6b04\u4f4d\u90fd\u6709\u5c0d\u61c9\u7684 pcap \u904e\u6ffe\u5668\u7b49\u6548\u9805\uff0c\u5247\u53ef\u4ee5\u4f7f\u7528\u7de8\u8f2f \u203a \u8907\u88fd \u203a \u5c07\u986f\u793a\u904e\u6ffe\u5668\u8f49\u63db\u70ba pcap \u904e\u6ffe\u5668\uff0c\u5c07\u986f\u793a\u904e\u6ffe\u5668\u8f49\u63db\u70ba pcap \u904e\u6ffe\u5668\u3002<\/li>\n<li>\u53ef\u4ee5\u4f7f\u7528\u4efb\u4f55\u6709\u6548\u7684\u5b57\u6bb5\u8868\u9054\u5f0f\u4f86\u5b9a\u7fa9\u81ea\u8a02\u5217\uff0c\u4f8b\u5982\u986f\u793a\u904e\u6ffe\u5668\u51fd\u6578\u3001\u8cc7\u6599\u5305\u5207\u7247\u3001\u7b97\u8853\u8a08\u7b97\u3001\u908f\u8f2f\u6e2c\u8a66\u3001\u539f\u59cb\u4f4d\u5143\u7d44\u5c0b\u5740\u548c\u5354\u5b9a\u5c64\u4fee\u98fe\u7b26\u3002<\/li>\n<li>\u4e5f\u53ef\u4ee5\u4f7f\u7528\u4efb\u4f55\u6709\u6548\u7684\u6b04\u4f4d\u8868\u9054\u5f0f\u5b9a\u7fa9 tshark -e \u7684\u81ea\u8a02\u8f38\u51fa\u6b04\u4f4d\u3002<\/li>\n<li>Wireshark \u53ef\u4ee5\u4f7f\u7528 zlib-ng \u800c\u4e0d\u662f zlib \u4f86\u5efa\u7f6e\u4ee5\u652f\u63f4\u58d3\u7e2e\u6a94\u6848\u3002 Zlib-ng \u6bd4 zlib \u5feb\u5f97\u591a\u3002\u5b98\u65b9 Windows \u548c macOS \u8edf\u9ad4\u5305\u5305\u542b\u6b64\u529f\u80fd\u3002<\/li>\n<li>\u9084\u9032\u884c\u4e86\u8a31\u591a\u5176\u4ed6\u6539\u9032\u3002\u6709\u95dc\u66f4\u591a\u8a73\u7d30\u4fe1\u606f\uff0c\u8acb\u53c3\u95b1<strong><a href=\"https:\/\/www.wireshark.org\/docs\/relnotes\/wireshark-4.4.0.html\" rel=\"nofollow\">\u201c\u65b0\u529f\u80fd\u548c\u66f4\u65b0\u529f\u80fd\u201d  \u90e8\u5206\u3002<\/a><\/strong><\/li>\n<\/ul>\n<p>\u4e0b\u8f09\uff1a<a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/Wireshark-4.4.0-x64.exe\" rel=\"nofollow\">Wireshark 4.4.0<\/a> | 83.2 MB\uff08\u958b\u6e90\uff09<br \/>\n\u4e0b\u8f09\uff1a<a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/WiresharkPortable64_4.4.0.paf.exe\" rel=\"nofollow\">\u4fbf\u651c\u5f0f Wireshark 4.4.0<\/a> | <a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/Wireshark-4.4.0-arm64.exe\" rel=\"nofollow\">ARM64 \u5b89\u88dd\u7a0b\u5f0f<\/a><br \/>\n\u8996\u5716\uff1a<a href=\"https:\/\/www.wireshark.org\/\" rel=\"nofollow\">Wireshark \u7db2\u7ad9<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ufeff Wireshark \u662f\u4e00\u500b\u7db2\u8def\u5c01\u5305\u5206\u6790\u5668\u3002\u7db2\u8def\u5c01\u5305\u5206\u6790\u5668\u5c07\u5617\u8a66\u64f7\u53d6\u7db2\u8def\u5c01\u5305\u4e26\u5617\u8a66\u76e1\u53ef\u80fd\u8a73\u7d30\u5730\u986f\u793a\u8a72\u5c01\u5305\u8cc7\u6599\u3002\u60a8\u53ef\u4ee5\u5c07\u7db2\u8def\u8cc7\u6599\u5305\u5206\u6790\u5668\u8996\u70ba\u4e00\u7a2e\u6e2c\u91cf\u8a2d\u5099\uff0c\u7528\u65bc\u6aa2\u67e5\u7db2\u8def\u96fb\u7e9c\u5167\u90e8\u767c\u751f\u7684\u60c5\u6cc1\uff0c\u5c31\u50cf\u96fb\u5de5\u4f7f\u7528\u96fb\u58d3\u8868\u6aa2\u67e5\u96fb\u7e9c\u5167\u90e8\u767c\u751f\u7684\u60c5\u6cc1\u4e00\u6a23\uff08\u7576\u7136\uff0c\u662f\u5728\u66f4\u9ad8\u7684\u7d1a\u5225\uff09 \uff09\u3002\u904e\u53bb\uff0c\u9019\u985e\u5de5\u5177\u8981\u4e48\u975e\u5e38\u6602\u8cb4\uff0c\u8981\u4e48\u662f\u5c08\u6709\u7684\uff0c\u6216\u8005\u5169\u8005\u517c\u800c\u6709\u4e4b\u3002\u7136\u800c\uff0c\u96a8\u8457 Wireshark \u7684\u51fa\u73fe\uff0c\u4e00\u5207\u90fd\u6539\u8b8a\u4e86\u3002 Wireshark \u53ef\u80fd\u662f\u7576\u4eca\u6700\u597d\u7684\u958b\u6e90\u8cc7\u6599\u5305\u5206\u6790\u5668\u4e4b\u4e00\u3002 \u6df1\u5165\u6aa2\u67e5\u6578\u767e\u500b\u5354\u8b70\uff0c\u4e26\u4e14\u4e00\u76f4\u5728\u6dfb\u52a0\u66f4\u591a\u5354\u8b70 \u5373\u6642\u6355\u7372\u548c\u96e2\u7dda\u5206\u6790 \u6a19\u6e96\u4e09\u7a97\u683c\u8cc7\u6599\u5305\u700f\u89bd\u5668 \u591a\u5e73\u53f0\uff1a\u53ef\u5728 Windows\u3001Linux\u3001OS X\u3001Solaris\u3001FreeBSD\u3001NetBSD \u7b49\u4e0a\u57f7\u884c \u64f7\u53d6\u7684\u7db2\u8def\u8cc7\u6599\u53ef\u4ee5\u900f\u904e GUI \u6216 TTY \u6a21\u5f0f TShark \u5be6\u7528\u7a0b\u5f0f\u700f\u89bd \u696d\u754c\u6700\u5f37\u5927\u7684\u986f\u793a\u904e\u6ffe\u5668 \u8c50\u5bcc\u7684 VoIP \u5206\u6790 \u8b80\/\u5beb\u8a31\u591a\u4e0d\u540c\u7684\u64f7\u53d6\u6a94\u6848\u683c\u5f0f \u4f7f\u7528 gzip \u58d3\u7e2e\u7684\u64f7\u53d6\u6a94\u6848\u53ef\u4ee5\u5373\u6642\u89e3\u58d3\u7e2e \u53ef\u4ee5\u5f9e\u4e59\u592a\u7db2\u8def\u3001IEEE 802.11\u3001PPP\/HDLC\u3001ATM\u3001\u85cd\u7259\u3001USB\u3001\u4ee4\u724c\u74b0\u3001\u5e40\u4e2d\u7e7c\u3001FDDI \u7b49\uff08\u53d6\u6c7a\u65bc\u60a8\u7684\u5e73\u53f0\uff09\u8b80\u53d6\u5373\u6642\u6578\u64da \u652f\u63f4\u591a\u7a2e\u5354\u5b9a\u7684\u89e3\u5bc6\uff0c\u5305\u62ec IPsec\u3001ISAKMP\u3001Kerberos\u3001SNMPv3\u3001SSL\/TLS\u3001WEP \u548c WPA\/WPA2 \u8457\u8272\u898f\u5247\u53ef\u4ee5\u61c9\u7528\u65bc\u8cc7\u6599\u5305\u5217\u8868\uff0c\u4ee5\u9032\u884c\u5feb\u901f\u3001\u76f4\u89c0\u7684\u5206\u6790 \u8f38\u51fa\u53ef\u4ee5\u532f\u51fa\u70ba XML\u3001PostScript\u00ae\u3001CSV \u6216\u7d14\u6587\u5b57 Wireshark 4.4.0 \u8b8a\u66f4\u65e5\u8a8c\uff1a \u5c0d\u5716\u5f62\u5c0d\u8a71\u65b9\u584a\u9032\u884c\u4e86\u8a31\u591a\u6539\u9032\u548c\u4fee\u5fa9\uff0c\u5305\u62ec I\/O \u5716\u5f62\u3001\u6d41\u7a0b\u5716\/VoIP \u901a\u8a71\u548c TCP \u6d41\u7a0b\u5716\u3002 Wireshark \u73fe\u5728\u652f\u63f4\u81ea\u52d5\u8a2d\u5b9a\u6a94\u5207\u63db\u3002\u60a8\u53ef\u4ee5\u5c07\u986f\u793a\u904e\u6ffe\u5668\u8207\u8a2d\u5b9a\u6a94\u95dc\u806f\u8d77\u4f86\uff0c\u7576\u60a8\u958b\u555f\u8207\u904e\u6ffe\u5668\u76f8\u7b26\u7684\u64f7\u53d6\u6a94\u6848\u6642\uff0cWireshark \u5c07\u81ea\u52d5\u5207\u63db\u5230\u8a72\u8a2d\u5b9a\u6a94\u3002 \u589e\u52a0\u4e86\u5c0d Lua [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[142,475,476,477,478,355,343,344,479,480,481],"class_list":["post-3587","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-network","tag-network-analyzer","tag-network-monitoring","tag-network-security","tag-network-traffic","tag-open-source","tag-soft","tag-software","tag-wifi-capture","tag-wifi-scanner","tag-wireshark"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/posts\/3587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/comments?post=3587"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/posts\/3587\/revisions"}],"predecessor-version":[{"id":3588,"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/posts\/3587\/revisions\/3588"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/media?parent=3587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/categories?post=3587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/zh\/wp-json\/wp\/v2\/tags?post=3587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}