A new version of Wireshark has been released recently by the Wireshark Team, it’s Wireshark 4.0.1, which contains several enhancements, new updates, and bug fixes.

Wireshark is one of the most widely used open-source free software packet analyzers that are currently available on the market, and it is available in a variety of options for different platforms.

There are many people who use Wireshark packet analyzers for the analysis of packets, not just network administrators only. As security analysts also use Wireshark packet analyzers for packet analysis purposes.

Several organizations make use of this tool to manage and monitor all the activities of their business operations on a regular basis.

Wireshark recently released its Wireshark 4.0.0 and the current Wireshark 4.0.1 is a quick update from the previous one.

Platform Support

For all the major platforms or operating systems, the Wireshark 4.0.1 packet analyzer is available and here below we have mentioned them:-

  • Windows
  • Linux
  • macOS
  • BSD

What’s new in Wireshark 4.0.1?

There are several primary purposes for using Wireshark as a network protocol analyzer, including:-

  • Analysis
  • Troubleshooting
  • Education
  • Development

Wireshark 4.0 and later do not have any official 32-bit Windows packages that you can install on your computer. Qt 5.12.2 is now the standard version that ships with Windows installers. The previous version of these packages was Qt 6.2.3, which was shipped by default.

This release removes the experimental syntax for the display filter used in Wireshark 4.0.0 that allowed literals to be displayed just using angle brackets <…​>. You can use the colon prefix instead while dealing with byte arrays.

This new version comes with several new bug fixes and here we have mentioned them below:-

  • Comparing a boolean field against 1 always succeeds on big-endian machines.
  • Qt: MaxMind GeoIP columns not added to Endpoints table.
  • Fuzz job crash output: fuzz-2022-10-04-7131.pcap.
  • The RTP player might not play audio on Windows.
  • Wireshark 4.0 breaks display filter expression with > sign.
  • Capture filters not working when using SSH capture and dumpcap.
  • Packet diagram field values are not terminated.
  • Packet bytes not displayed completely if scrolling.
  • Fuzz job crash output: fuzz-2022-10-13-7166.pcap.
  • Decoding bug H.245 userInput Signal.
  • CFDP dissector doesn’t handle \”destination filename\” only.
  • Home page capture button doesn’t pop up capture options dialog.
  • Missing dot in H.248 protocol name.
  • Missing dot for protocol H.264 in protocol column.
  • Fuzz job crash output: fuzz-2022-10-23-7240.pcap.

Updated Protocol Support

Here below we have mentioned all the updated protocol support:-

  • ASN.1 PER
  • CFDP
  • Diameter
  • DirectPlay
  • F5 Ethernet Trailer
  • GTP
  • H.223
  • H.248
  • H.264
  • H.265
  • IEEE 802.11
  • IPv4
  • MBIM
  • O-RAN FH CUS
  • PFCP
  • RTCP
  • SCTP
  • SMB
  • TCP
  • TRANSUM

While if we talk about the addition of new and updated capture file support, this new version of Wireshark 4.0.1 comes with BLF capture file support.

It’s strongly recommended that users should immediately update their old version to the newly released Wireshark 4.0.1 version. With this update, users can enjoy the newly added features and bug fixes for a smoother and more refined user experience.

Apart from this, you can download the latest version of the application by clicking the following link if you would like to get it.

WireShark Training: Complete Wireshark Network Analysis Bundle – Hands-on course provides complete network analysis Training using Wireshark.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and their…

1 hour ago

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…

14 hours ago

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…

18 hours ago

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…

18 hours ago

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…

19 hours ago

Metasploit Framework Released with New Features

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…

21 hours ago