Time for action – viewing management, control, and data frames
Now we will learn how to apply filters in Wireshark to look at management, control, and data frames.
Please follow these instructions step by step:
- To view all the management frames in the packets being captured, enter the filter
wlan.fc.type == 0
into the filter window and hit Enter. You can stop the packet capture if you want to prevent the packets from scrolling down too fast. - To view control frames, modify the filter expression to read
wlan.fc.type == 1
: - To view data frames, modify the filter expression to
wlan.fc.type == 2
: - To additionally select a subtype, use the
wlan.fc.subtype
filter. For example, to view all the beacon frames among all management frames, use the following filter:(wlan.fc.type == 0) && (wlan.fc.subtype == 8)
- Alternatively, you can right-click on any of the header fields in the middle window and then select Apply as Filter | Selected to add it as a filter:
- This will automatically add the correct filter expression for you in the Filter field.
What just happened?
We just learned how to filter packets in Wireshark using various filter expressions. This helps us monitor selected packets from devices we are interested in, instead of trying to analyze all the packets in the air.
Also, we can see that the packet headers of management, control, and data frames are in plain text and are not encrypted. Anyone who can sniff the packets can read these headers. It is also important to note that it is also possible for a hacker to modify any of these packets and retransmit them. As there is no integrity or replay attack mitigation in the protocol, this is very easy to do. We will look at some of these attacks in later chapters.
Have a go hero – playing with filters
You can consult Wireshark's manual to learn more about available filter expressions and how to use them. Try playing around with various filter combinations till you are confident that you can drill down to any level of detail, even in a very large packet trace.
In the next exercise, we will look at how to sniff data packets transferred between our access point and wireless client.
- Oracle 11g從入門到精通(第2版) (軟件開發視頻大講堂)
- 深入淺出Java虛擬機:JVM原理與實戰
- Learn Scala Programming
- Mastering Apache Spark 2.x(Second Edition)
- Python完全自學教程
- Python數據結構與算法(視頻教學版)
- 快人一步:系統性能提高之道
- Hands-On Full Stack Development with Go
- Learning Unity 2D Game Development by Example
- Asynchronous Android Programming(Second Edition)
- Procedural Content Generation for C++ Game Development
- Emgu CV Essentials
- Machine Learning With Go
- Natural Language Processing with Python Quick Start Guide
- 深入實踐DDD:以DSL驅動復雜軟件開發