Open sniffer output in Wireshark
(2026-01-21)
You need:
- wireshark
- fgt2eth.exe
Take your capture using verbosity level 6:
diagnose sniff packet any ‘host 8.8.8.8 and icmp’ 6 0
Download the screen buffer of the raw capture, then run it through fgt2eth.exe:
> fgt2eth.exe -in screencap -out capture.pcap
You should be able to open capture.pcap in wireshark.
Note that the time resolution for this is terrible, and depending on how fast the packet stream you are capturing is you might have to wait a long time for the screen buffer to flush and even then might lose things.
(Source)