Chapter 11. Customizing Wireshark

Table of Contents

11.1. Introduction
11.2. Start Wireshark from the command line
11.3. Packet colorization
11.4. Control Protocol Dissection
11.4.1. The “Enabled Protocols” dialog box
11.4.2. User Specified Decodes
11.5. Preferences
11.5.1. Appearance
11.5.2. Columns
11.5.3. Font and Colors
11.5.4. Layout
11.5.5. Capture
11.5.6. Expert Items
11.5.7. Filter Buttons
11.5.8. Name Resolution
11.5.9. Protocols
11.5.10. RSA Keys
11.5.11. Statistics
11.5.12. Advanced
11.6. Configuration Profiles
11.6.1. Automatic Profile Switching
11.7. User Accessible Tables
11.8. ESS Category Attributes
11.9. MaxMind Database Paths
11.10. IEEE 802.11 WLAN Decryption Keys
11.10.1. Adding Keys
11.10.2. Gotchas
11.11. IKEv2 decryption table
11.12. Object Identifiers
11.13. PRES Users Context List
11.14. SCCP users Table
11.15. SMI (MIB and PIB) Modules
11.16. SMI (MIB and PIB) Paths
11.17. SNMP Enterprise Specific Trap Types
11.18. SNMP users Table
11.19. Tektronix K12xx/15 RF5 protocols Table
11.20. User DLTs dissector table
11.21. Protobuf Search Paths
11.22. Protobuf UDP Message Types

11.1. Introduction

Wireshark’s default behavior will usually suit your needs pretty well. However, as you become more familiar with Wireshark, it can be customized in various ways to suit your needs even better. In this chapter we explore:

  • How to start Wireshark with command line parameters
  • How to colorize the packet list
  • How to control protocol dissection
  • How to use the various preference settings