Skip to content

Commit 183fb80

Browse files
committed
Center images in WiFi packet capture post
1 parent 0945f9f commit 183fb80

File tree

1 file changed

+12
-4
lines changed

1 file changed

+12
-4
lines changed

Diff for: content/blog/wifi-packet-capture.md

+12-4
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,9 @@ Since networking and WiFi use so many acronymns and abbreviations (and I will us
3030
- **Band:** A large slice of radio frequency (RF) spectrum available for use by WiFi. This includes 2.4GHz and 5GHz bands, as well as 6GHz band in some parts of the world.
3131
- **Channel:** A pre-defined and regulated slice of a band which a STA and AP can use to transmit data.
3232

33-
![802.11 LAN Topology](/blog/wifi-packet-capture/80211_lan_topology.png)
33+
<div align="center">
34+
<img src="/blog/wifi-packet-capture/80211_lan_topology.png" alt="802.11 LAN Topology"/>
35+
</div>
3436

3537
## Instructions
3638

@@ -321,17 +323,23 @@ For on-the-fly analysis, editing a live or recently-stopped capture in Wireshark
321323

322324
For more a quick-reference WiFi (802.11) Wireshark filter cheatsheet, see [this PDF](/blog/wifi-packet-capture/80211_wireshark_cheatsheet.pdf).
323325

324-
![Selecting wireless interface to perform packet capture on](/blog/wifi-packet-capture/wireshark_selecting_interface.png)
326+
<div align="center">
327+
<img src="/blog/wifi-packet-capture/wireshark_selecting_interface.png" alt="Selecting wireless interface to perform packet capture on"/>
328+
</div>
325329

326-
![Packet capture in progress using interface 'moni0'](/blog/wifi-packet-capture/wireshark_pcap_in_progress.png)
330+
<div align="center">
331+
<img src="/blog/wifi-packet-capture/wireshark_pcap_in_progress.png" alt="Packet capture in progress using interface 'moni0'"/>
332+
</div>
327333

328334
### 9\. Decrypting WPA-Personal & WPA2-Personal Wireless Traffic
329335

330336
When attempting to capture network traffic to/from an access point (AP) that uses "open" authentication (i.e. no encryption), no extra configuration is necessary. Everything is plaintext and painfully insecure. Wireshark just decodes the data as you'd expect. However, for APs which use encryption, you need to perform some extra steps.
331337

332338
If you know the password for the AP, it is straightforward to configure Wireshark to decrypt the data. To do so, configure the credential for the AP in Wireshark (e.g. password and SSID) and capture the initial connection between the STA and the AP, specifically the 4-way handshake. In the WiFi world, the initial connection is known as 'association'. To verify you have captured the 4-way handshake, filter for `eapol` or `eapol.type == 3`. You should see something similar to the following (source and destination MAC addresses removed):
333339

334-
![Image of Wireshark capture showing a 4-way handshake](/blog/wifi-packet-capture/wireshark_4way_handshake.png)
340+
<div align="center">
341+
<img src="/blog/wifi-packet-capture/wireshark_4way_handshake.png" alt="Image of Wireshark capture showing a 4-way handshake"/>
342+
</div>
335343

336344
For WPA3-Personal, Wireshark can decrypt traffic. However, the process has limitations and is more involved to configure due to the nature of WPA3-Personal authentication (oh darn, it's more secure! /s). The main limitation when decrypting WPA3-Personal is the traffic you can decrypt with one Wireshark-configured key is limited to traffic transmitted between a single STA and AP, and that's assuming you can easily get the key. This limitation contrasts with WPA-Personal and WPA2-Personal where knowing the credentials is enough to decrypt any traffic transmitted to/received from that AP. It is unclear if Wireshark can decrypt OWE (so-called 'Enhanced Open') authentication.
337345

0 commit comments

Comments
 (0)