What people will use it depends on their knowledge but also on tool availability on the system.
Because of graphical user interface I prefer to use wireshark. Also it has a lot of knowledge about decoding protocols and presenting the composing fields (and it helps you use those fields to make custom display filters).
Note: filter syntax used to select captured packets is different from the display filter.
tshark & dupmcap (present in wireshark distribution) are command line tools used to capture network traffic from terminal.
Note: tshark uses dumpcap.
So when it is possible to lose packets (LAN speed is so big that matches capture&writing speed) use dumpcap. See info & video from https://www.networkcomputing.com/networking/wireshark-packet-capture-tshark-vs-dumpcap.
Both tools have nice features as in capture in files and limit the packets size, file size or even the number of files (and you can use them circularly). See https://www.wireshark.org/docs/man-pages/dumpcap.html and https://www.wireshark.org/docs/man-pages/tshark.html.
To underline what is writeen above, I would like to quote https://tshark.dev/capture/dumpcap/:
"Dumpcap is the part of the wireshark suite that captures packets. Unlike Wireshark and tshark, dumpcap cannot see non-physical interfaces like extcap interfaces. tshark has most of the same flags that dumpcap has because tshark calls dumpcap for much of its capture functionality."
But wireshark&comp it is not installed on all systems. So I am using tcpdump in command line when wireshark is not available or when I want quickly to debug network/routing issues (e.g. I want to see only if the packets are flowing in both ways on a known port).