Sunday, March 30, 2025
HomeNetwork SecurityWireshark 3.4.9 Released – What’s New!!

Wireshark 3.4.9 Released – What’s New!!

Published on

SIEM as a Service

Follow Us on Google News

Recently, Wireshark has released a new version of its free and open-source packet analyzer, Wireshark 3.4.9 with all new features and protocols. 

Wireshark is one of the world’s most widespread network protocol analyzers, and the analyzers are used for different purposes, like:- 

  • Troubleshooting
  • Analysis
  • Development
  • Education 

Wireshark runs on Windows, Linux, and macOS, with separate downloads for 32-bit and 64-bit versions of the operating systems.

What’s New in Wireshark 3.4.9?

Here are the new things added:-

  • Extensive examination of hundreds of protocols, with more being annexed all the time
  • Live capture and offline review
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Obtained network data that can be browsed through a GUI, or via the TTY-mode TShark utility
  • It has the most compelling display filters in the industry
  • Rich VoIP analysis
  • Read/write various capture file formats
  • Capture files packed with gzip can be decompressed on the fly
  • Live data can be viewed from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others
  • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Coloring rules can be implemented to the packet list for expeditious, automatic analysis
  • Output can be exported to XML, PostScript, CSV, or plain text

Bug Fixes

Here are the fixes made in this new version:-

  • TShark PDML output embeds “proto” elements within other “proto” elements Issue 10588.
  • Filter expressions correlating against single-octet hex strings where the hex digit string equals a protocol name don’t work Issue 12810.
  • AMQP 0.9: dissector fails to handle Content-Body frame split across TCP packets Issue 14217.
  • IEEE 802.15.4: Missing check on “PAN ID Present” bit of the Multipurpose Frame Control field Issue 17496.
  • Wireshark ignored some characters in the filename when transporting SMB objects. Issue 17530.
  • tshark -z credentials: assertion failed: (allocator→in_scope) Issue 17576.
  • IS-IS Extended IP Reachability Prefix-SID not decoded properly Issue 17610.
  • Error when reloading Lua plugins with a capture file loaded via a custom Lua file handler Issue 17615.
  • Absolute time UTC field filters are constructed incorrectly, don’t match the packet Issue 17617.
  • GUI freezes when clicking on a large (non-capture) file in File chooser Issue 17620.
  • Crash after selecting a different profile while capturing Issue 17622.
  • BT-DHT reports malformed packets that are actually uTP on the same connection Issue 17626.

Updated Protocol Support

Here is the list of all updated protocol support:-

  • AMQP
  • Aruba IAP
  • BGP
  • BT-DHT
  • CoAP
  • DCERPC SPOOLSS
  • Diameter
  • EPL
  • GSM A-bis OML
  • GSM A-I/F COMMON
  • GSM SIM
  • IEEE 1905.1a
  • IEEE 802.15.4
  • IMAP
  • InfiniBand
  • ISIS LSP
  • ISObus VT
  • JPEG
  • MP2T
  • NORDIC_BLE
  • QUIC
  • RTCP
  • SDP
  • SMB
  • TWAMP-Control
  • USB HID
  • VSS Monitoring

New and Updated Capture File Support

  • CAM Inspector
  • Ixia IxVeriWave
  • pcapng
  • USBDump

Vendor-supplied Packages

The vendors of Linux and Unix mostly provide their own Wireshark packages, and therefore one can usually install or simply update Wireshark utilizing the package management system specific to that platform. 

Moreover, while downloading it users will get a list of third-party packages on the download page on the Wireshark website

But, this new version of Wireshark has many features and it also fixed many bugs that we have mentioned above, so, users must update their Wireshark for better performance as soon as possible.

The new version can be downloaded from here.

Training Course: Complete Wireshark Network Analysis Bundle – Hands-on course provides complete network analysis Training using Wireshark.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture...

Chinese Hacked Exploit Juniper Networks Routers to Implant Backdoor

Cybersecurity researchers have uncovered a sophisticated cyber espionage campaign targeting critical network infrastructure, marking...

Cl0p Ransomware Hide Itself on Compromised Networks After Exfiltrate the Data

The Cl0p ransomware group, a prominent player in the cybercrime landscape since 2019, has...