wireshark

Topics: Wireless network, Wi-Fi, Ethernet Pages: 8 (452 words) Published: September 2, 2014


Wireshark Wireless
Fred Grouper
Kaplan University
Systems Analysis and Design
MSIT 530
Professor Robert
March 3, 2013

Wireshark Wireless Capture

Source MAC addresses, destination MAC addresses

This screen shot shows the source address of the workstation and a destination address representing a broadcast transmission for the beacon.

This screen shot shows the source and destination packet of the 802.11 packet

State of protection and the authentication algorithm used by the AUTHENTICATION packet.

This screen shows that the Authentication Algorithm is Open System and the packet is not protected.

Cipher suites and authentication keys offered by the AUTHENTICATION packet.

This screen shows the authentication under the tag section of the Microsoft WPA information. This screen also shows the source address of the Authentication packet beginning the authentication as the workstation.

Which system sent the ASSOCIATION packet:

The destination address is set to 00:18:39:f5:ba:bb which is the address of the endpoint. The source address is 00:13:02:d1:b6:4f and this is the address of the transmitter and the transmitter is an AP as shown on the screen therefore the send of the association packet is the Access Point.

The 802.11 protocol is more complicated than your standard Ethernet protocol. The wireless protocol must deal additional requirements relating to the connectivity to the access point. The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location. Another area of interest was the information that is transmitted to the access points themselves. Understanding how each of the devices communicate with the access points through the beacon and the RTS and ACK is certainly something that can come in handy when diagnosing problems. What I find completely amazing abut wireless communications is Roaming capabilities. To believe that a device can automatically connect through a different access point in the same service set and still continue communications without having to re-authenticate. The authentication and association are also key components of the wireless technology. In an adhoc situation the workstation or laptop is continuously looking for an access point to associate to when it finds one it attempts to associate by sending association packets to the access point expecting an acknowledgment back. The authentication method is defined by the access point and the workstation and this information is also send via authentication packets from the access point to the workstation.

References
Dean, T. ( 2013). Comptia network+ n10-005 in depth. [Books24x7 version] Retrieved from http://common.books24x7.com.lib.kaplan.edu/toc.aspx?bookid=47482.


References: Dean, T. ( 2013). Comptia network+ n10-005 in depth. [Books24x7 version] Retrieved from http://common.books24x7.com.lib.kaplan.edu/toc.aspx?bookid=47482.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Lab 2.6.2: Using Wireshark Essay
  • Wireshark Essay
  • Essay about Wireshark lab1
  • Essay about Wireshark Tcp Lab
  • Essay about Wireshark Capture: Network Traffic
  • Wireshark Lab Analysis Essay
  • Essay about Using Wireshark to View Network Traffic
  • Netw240 Week 7 Linux Wireshark Lab Report Essay Example

Become a StudyMode Member

Sign Up - It's Free