Sunday, May 18, 2025
HomeNetwork SecurityWireshark 3.4.9 Released – What’s New!!

Wireshark 3.4.9 Released – What’s New!!

Published on

SIEM as a Service

Follow Us on Google News

Recently, Wireshark has released a new version of its free and open-source packet analyzer, Wireshark 3.4.9 with all new features and protocols. 

Wireshark is one of the world’s most widespread network protocol analyzers, and the analyzers are used for different purposes, like:- 

  • Troubleshooting
  • Analysis
  • Development
  • Education 

Wireshark runs on Windows, Linux, and macOS, with separate downloads for 32-bit and 64-bit versions of the operating systems.

- Advertisement - Google News

What’s New in Wireshark 3.4.9?

Here are the new things added:-

  • Extensive examination of hundreds of protocols, with more being annexed all the time
  • Live capture and offline review
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Obtained network data that can be browsed through a GUI, or via the TTY-mode TShark utility
  • It has the most compelling display filters in the industry
  • Rich VoIP analysis
  • Read/write various capture file formats
  • Capture files packed with gzip can be decompressed on the fly
  • Live data can be viewed from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others
  • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Coloring rules can be implemented to the packet list for expeditious, automatic analysis
  • Output can be exported to XML, PostScript, CSV, or plain text

Bug Fixes

Here are the fixes made in this new version:-

  • TShark PDML output embeds “proto” elements within other “proto” elements Issue 10588.
  • Filter expressions correlating against single-octet hex strings where the hex digit string equals a protocol name don’t work Issue 12810.
  • AMQP 0.9: dissector fails to handle Content-Body frame split across TCP packets Issue 14217.
  • IEEE 802.15.4: Missing check on “PAN ID Present” bit of the Multipurpose Frame Control field Issue 17496.
  • Wireshark ignored some characters in the filename when transporting SMB objects. Issue 17530.
  • tshark -z credentials: assertion failed: (allocator→in_scope) Issue 17576.
  • IS-IS Extended IP Reachability Prefix-SID not decoded properly Issue 17610.
  • Error when reloading Lua plugins with a capture file loaded via a custom Lua file handler Issue 17615.
  • Absolute time UTC field filters are constructed incorrectly, don’t match the packet Issue 17617.
  • GUI freezes when clicking on a large (non-capture) file in File chooser Issue 17620.
  • Crash after selecting a different profile while capturing Issue 17622.
  • BT-DHT reports malformed packets that are actually uTP on the same connection Issue 17626.

Updated Protocol Support

Here is the list of all updated protocol support:-

  • AMQP
  • Aruba IAP
  • BGP
  • BT-DHT
  • CoAP
  • DCERPC SPOOLSS
  • Diameter
  • EPL
  • GSM A-bis OML
  • GSM A-I/F COMMON
  • GSM SIM
  • IEEE 1905.1a
  • IEEE 802.15.4
  • IMAP
  • InfiniBand
  • ISIS LSP
  • ISObus VT
  • JPEG
  • MP2T
  • NORDIC_BLE
  • QUIC
  • RTCP
  • SDP
  • SMB
  • TWAMP-Control
  • USB HID
  • VSS Monitoring

New and Updated Capture File Support

  • CAM Inspector
  • Ixia IxVeriWave
  • pcapng
  • USBDump

Vendor-supplied Packages

The vendors of Linux and Unix mostly provide their own Wireshark packages, and therefore one can usually install or simply update Wireshark utilizing the package management system specific to that platform. 

Moreover, while downloading it users will get a list of third-party packages on the download page on the Wireshark website

But, this new version of Wireshark has many features and it also fixed many bugs that we have mentioned above, so, users must update their Wireshark for better performance as soon as possible.

The new version can be downloaded from here.

Training Course: Complete Wireshark Network Analysis Bundle – Hands-on course provides complete network analysis Training using Wireshark.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Europol Launches Taskforce to Combat Violence-as-a-Service Networks

Europol has announced the launch of a powerful new Operational Taskforce (OTF), codenamed GRIMM, to...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...