Skip to content

Commit 17baca6

Browse files
committed
Add image shortcode, center images in WiFi packet capture post
1 parent 6e30796 commit 17baca6

File tree

2 files changed

+7
-4
lines changed

2 files changed

+7
-4
lines changed

Diff for: content/blog/wifi-packet-capture.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Since networking and WiFi use so many acronymns and abbreviations (and I will us
3030
- **Band:** A large slice of radio frequency (RF) spectrum available for use by WiFi. This includes 2.4GHz and 5GHz bands, as well as 6GHz band in some parts of the world.
3131
- **Channel:** A pre-defined and regulated slice of a band which a STA and AP can use to transmit data.
3232

33-
![802.11 LAN Topology](/blog/wifi-packet-capture/80211_lan_topology.png)
33+
{{ image(src="/blog/wifi-packet-capture/80211_lan_topology.png", align="center", alt="802.11 LAN Topology") }}
3434

3535
## Instructions
3636

@@ -321,17 +321,17 @@ For on-the-fly analysis, editing a live or recently-stopped capture in Wireshark
321321

322322
For more a quick-reference WiFi (802.11) Wireshark filter cheatsheet, see [this PDF](/blog/wifi-packet-capture/80211_wireshark_cheatsheet.pdf).
323323

324-
![Selecting wireless interface to perform packet capture on](/blog/wifi-packet-capture/wireshark_selecting_interface.png)
324+
{{ image(src="/blog/wifi-packet-capture/wireshark_selecting_interface.png", align="center", alt="Image of selecting wireless interface to perform packet capture on") }}
325325

326-
![Packet capture in progress using interface 'moni0'](/blog/wifi-packet-capture/wireshark_pcap_in_progress.png)
326+
{{ image(src="/blog/wifi-packet-capture/wireshark_selecting_interface.png", align="center", alt="Image of packet capture in progress using interface 'moni0'") }}
327327

328328
### 9\. Decrypting WPA-Personal & WPA2-Personal Wireless Traffic
329329

330330
When attempting to capture network traffic to/from an access point (AP) that uses "open" authentication (i.e. no encryption), no extra configuration is necessary. Everything is plaintext and painfully insecure. Wireshark just decodes the data as you'd expect. However, for APs which use encryption, you need to perform some extra steps.
331331

332332
If you know the password for the AP, it is straightforward to configure Wireshark to decrypt the data. To do so, configure the credential for the AP in Wireshark (e.g. password and SSID) and capture the initial connection between the STA and the AP, specifically the 4-way handshake. In the WiFi world, the initial connection is known as 'association'. To verify you have captured the 4-way handshake, filter for `eapol` or `eapol.type == 3`. You should see something similar to the following (source and destination MAC addresses removed):
333333

334-
![Image of Wireshark capture showing a 4-way handshake](/blog/wifi-packet-capture/wireshark_4way_handshake.png)
334+
{{ image(src="/blog/wifi-packet-capture/wireshark_4way_handshake.png", align="center", alt="Image of Wireshark capture showing a 4-way handshake") }}
335335

336336
For WPA3-Personal, Wireshark can decrypt traffic. However, the process has limitations and is more involved to configure due to the nature of WPA3-Personal authentication (oh darn, it's more secure! /s). The main limitation when decrypting WPA3-Personal is the traffic you can decrypt with one Wireshark-configured key is limited to traffic transmitted between a single STA and AP, and that's assuming you can easily get the key. This limitation contrasts with WPA-Personal and WPA2-Personal where knowing the credentials is enough to decrypt any traffic transmitted to/received from that AP. It is unclear if Wireshark can decrypt OWE (so-called 'Enhanced Open') authentication.
337337

Diff for: templates/shortcodes/image.html

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
<div {% if align %}align="{{align}}" {% endif %}>
2+
<img src="{{src}}" {% if alt %}alt="{{alt}}" {% endif %} />
3+
</div>

0 commit comments

Comments
 (0)