- BackTrack 5 Wireless Penetration Testing Beginner's Guide
- Vivek Ramachandran
- 379字
- 2021-04-02 18:48:46
Time for action – viewing Management, Control, and Data frames
Now we will learn how to apply filters in Wireshark to look at management, control, and data frames.
Please follow these instructions step-by-step:
- To view all the Management frames in the packets being captured, enter the filter wlan.fc.type == 0 into the filter window and click on Apply. You can stop the packet capture if you want to prevent the packets from scrolling down too fast:
- To view Control Frames, modify the filter expression to read wlan.fc.type == 1:
- To view the Data Frames, modify the filter expression to wlan.fc.type == 2:
- To additionally select a sub-type, use the wlan.fc.subtype filter. For example, to view all the Beacon frames among all Management frames use the following filter (wlan.fc.type == 0) && (wlan.fc.subtype == 8).
- Alternatively, you can right-click on any of the header fields in the middle window and then select Apply as Filter | Selected to add it as a filter:
- This will automatically add the correct filter expression for you in the Filter field as shown:
What just happened?
We just learned how to filter packets in Wireshark using various filter expressions. This helps us to monitor selected packets from devices we are interested in, instead of trying to analyze all the packets in the air.
Also, we can see that the packet headers of Management, Control, and Data frames are in plain text and does not contain any encryption. This way anyone who can sniff the packets can read these headers. It is also important to note that it is also possible for a hacker to modify any of these packets and re-transmit them. As there is no integrity or replay attack mitigation in the protocol, this is very easy to do. We will look at some of these attacks in later chapters.
Have a go hero – playing with filters
You can consult Wireshark's manual to know more about the available filter expressions and how to use them. Try playing around with various filter combinations till you are confident you can drill down to any level of detail, even a very large packet trace.
In the next exercise, we will look at how to sniff data packets transferred between our access point and wireless client.
- 剪映短視頻制作全流程:剪輯、調(diào)色、字幕、音效
- 自己動(dòng)手寫分布式搜索引擎
- OpenStack實(shí)戰(zhàn)指南
- Inkscape 0.48 Illustrator's Cookbook
- InDesign平面設(shè)計(jì)案例教程:從設(shè)計(jì)到印刷
- Unity Game Development Essentials
- Illustrator平面設(shè)計(jì)立體化教程:Illustrator 2021(微課版)
- Photoshop網(wǎng)店美工實(shí)例教程(第2版 全彩微課版)
- Building Websites with ExpressionEngine 1.6
- 金融精英PPT實(shí)操手冊(cè):世界知名公司這樣展示研究報(bào)告
- 零基礎(chǔ)學(xué)Premiere Pro短視頻制作
- SketchUP草圖繪制從新手到高手
- Photoshop CC設(shè)計(jì)與應(yīng)用任務(wù)教程
- 中文版3ds Max 2020基礎(chǔ)教程
- 精通AutoCAD 2013機(jī)械設(shè)計(jì)