Wireshark 4.6.0 Supports Macos Pktap Metadata (pid, Process Name, Etc.)
Posted3 months agoActive3 months ago
nuxx.netTechstory
supportivepositive
Debate
20/100
WiresharkMacosNetwork Analysis
Key topics
Wireshark
Macos
Network Analysis
The latest Wireshark release supports macOS Pktap metadata, enhancing network analysis capabilities, and sparking discussions on its importance and potential expansion to other platforms.
Snapshot generated from the HN discussion
Discussion Activity
Light discussionFirst comment
41m
Peak period
5
1-2h
Avg / period
2.4
Comment distribution22 data points
Loading chart...
Based on 22 loaded comments
Key moments
- 01Story posted
Oct 14, 2025 at 10:18 AM EDT
3 months ago
Step 01 - 02First comment
Oct 14, 2025 at 10:59 AM EDT
41m after posting
Step 02 - 03Peak activity
5 comments in 1-2h
Hottest window of the conversation
Step 03 - 04Latest activity
Oct 15, 2025 at 3:13 AM EDT
3 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45580315Type: storyLast synced: 11/20/2025, 6:24:41 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
Anyone who relies on non-trivial packet capture or processing workflows, ditches Wireshark (optionally reusing dissectors) and writes custom tooling (which is very easy to do).
I would absolutely love for someone to write a good alternative to wireshark.
Once loaded, you have to be super careful. One update to the filter bar, like "!icmp" and you'll have to wait another 20 minutes for all the dissectors to be re-run (for some reason.)
As a previous commenter stated, if you work with Wireshark a lot, you eventually write your own tool for your performance needs. It feels magical to have a 3-page C program sitting over libpcap giving reports in miliseconds that would take wireshark minutes.
It is quite easy to write specialized performance tools on top of `sharkd`, and since it has the entire power of the EPAN (including statistics, charts etc.), using `sharkd` is significantly more effective than reading straight from libpcap.
Any demos available of something like this?
https://manpages.debian.org/stretch/libpcap0.8-dev/pcap_open...
As it stands though, using the gui bits of the wireshark family of tools is just painful, and slow (as you stated)
Can you provide a reference? From what I can see this dissection was only added about five months ago: https://gitlab.com/wireshark/wireshark/-/commit/389f6356c9d5...
(And just hit release with 4.6.0.)
And I know with certainty that it did not work when I wrote my previous blog post about this, back in 2021.
So, from what I can see, the specific functionality to dissect Darwin metadata in pcapng captures, from macOS' tcpdump, has not been "...available for years.".
VPNs have existed for a long time, while wireshark is the current new curve, there will always be the next curve that emerges and evolves to replace the current one.
Wireshark is great.
> People don’t realize there’s no real alternative
EtherPeek/OmniPeek has entered the chat
There were tools before Wireshark, and there will be tools after it's long gone. Just because you haven't heard of them doesn't mean they don't exist!
My current worflow is capture with pktmon, then analysis in Microsoft Network Monitor to expose PID stuff.
I figure there /has/ to be a way to do it similarly in Wireshark, I just haven't found a how-to and haven't dug into it myself. Once I do (it's on my casual todo list) I'll do a writeup on that as well, since it'd be super useful.
> ptcpdump is a tcpdump-compatible packet analyzer powered by eBPF, automatically annotating packets with process/container/pod metadata when detectable. Inspired by jschwinger233/skbdump.
awesome-ebpf > Tools: https://github.com/zoidyzoidzoid/awesome-ebpf#tools
opensnitch is an egress firewall that displays PIDs: https://github.com/evilsocket/opensnitch
edgeshark: https://github.com/siemens/edgeshark :
> Discover and capture container network traffic from your comfy desktop Wireshark, using a containerized service and a Wireshark plugin.
Looks like it's possible to select containers from a GUI form with edgeshark. Perhaps something similar for process selection?
Not creating a capture and then downloading it, actual real time network captures.
[0] https://gist.github.com/milesrichardson/fcec8c6d54a21845dd9f...