The Wireshark Foundation has officially announced the release of Wireshark 4.4.2, the latest version of the world’s most popular network protocol analyzer.
Wireshark is wide use in troubleshooting, analysis, development, and educational purposes, Wireshark continues to be a vital tool for network professionals and enthusiasts.
The nonprofit Wireshark Foundation, which promotes protocol analysis education, emphasizes the importance of community contributions to sustain its work.
Maximizing Cybersecurity ROI: Expert Tips for SME & MSP Leaders – Attend Free Webinar
The release focuses on resolving several security vulnerabilities and bugs:
dumpcap
when run from TShark with a capture filter (Issue 20108).Other fixes included improvements to protocol dissectors such as SIP (Session Initiation Protocol), Modbus, and USB CCID, along with addressing various user interface issues, including crashes when dragging fields in the packet details view.
While no new protocols were introduced in this version, several existing protocols received updates, including:
Additionally, display filters now handle floating-point conversion errors more accurately, and the Lua API has been updated to support comma-separated ranges in various locales.
A notable improvement for TShark users is the updated syntax for dumping fields with a specific prefix. The command has been changed from -G fields prefix
to -G fields,prefix
, allowing more flexibility and compatibility with configuration profiles.
Released earlier, Wireshark 4.4.0 introduced several significant improvements:
The 4.4.0 version also boasted performance improvements, such as building with zlib-ng for faster compressed file handling.
Wireshark’s source code and installation packages are available for download at wireshark.org/download. Linux and Unix users can also check their platform-specific package management systems for updates.
With its focus on reliability and security, Wireshark 4.4.2 is a recommended update for all users.
Those interested in supporting the project can do so by visiting wiresharkfoundation.
Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial
Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z Series…
Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware targeting…
A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies and…
Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls.…
Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated…
EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the…