Wireshark-dev: [Wireshark-dev] Feature Request: Process-Aware Packet Filtering and Captur

From: SHAiDA <ayubarbaty1@xxxxxxxxx>
Date: Sat, 24 May 2025 12:20:01 +0300
Dear Wireshark Development Team,

I hope this message finds you well.

I would like to suggest a feature enhancement for Wireshark that would greatly benefit malware analysts, forensic investigators, and application developers: the ability to filter and save captured traffic based on a specific process name or PID running on the host.

Currently, packet capture is interface-based, and while powerful, it lacks native visibility into which process is generating or receiving specific network traffic. Adding a feature to bind captured packets to the originating process would:

Enable .pcap filtering or exporting per-process

Allow targeted analysis of suspicious executables

Improve correlation of traffic with endpoint behavior in live investigations


I realize this would involve integration with OS-specific APIs (e.g., GetExtendedTcpTable on Windows or /proc on Linux), but it would be a groundbreaking improvement for many use cases.

Thank you for your time, and for developing such an incredible tool for the networking and security community.

Best regards,
Ayub
Cybersecurity Analyst