WiFi Air Sniffer

版权声明:本文为博主原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/kv110/article/details/23766791

1. install AirPcap dongle driver
 after installation, check device manager
 Packet Caputre devices - AirPcap USB Wireless Capture Adapter (or similar)

 
2. Run Wireshark (current version v1.10.6)
  Click icon menu "Show the caputre options" (or menu: Capture: Options)
  check the AirPcap driver
  double click, show "Edit interface Settings"
  Check "Caputre packets in promiscuous mode"
  Click "Wireless Settings"
  Set Channel (same as AP setting, for example 2412 BG11), Offset (0), Capture type (802.11+Radio)
  Click "Start" to capture packets, Click "Stop" to stop capturing

 
3. search all packets related with one AP/Sta
   wlan.addr == **:**:**:**:**:**
  

 

4. display filter

ip.src==*.*.*.*
ip.dst==*.*.*.*
http.request.method=="POST";
tcp.srcport==80

wlan.addr == *.*.*.*
wlan.fc.type == 0 management frame
wlan.fc.type == 1 control frame
wlan.fc.type == 2 data frame
wlan.fc.type_subtype == 0x24 null data
wlan.fc.type_subtype == 0x28 qos data frame
wlan.fc.type_subtype == 0x00  Association request
wlan.fc.type_subtype == 0x01 Association response
wlan.fc.type_subtype == 0x04 Probe request
wlan.fc.type_subtype == 0x05 Probe response
wlan.fc.type_subtype == 0x08 Beacon
wlan.fc.type_subtype == 0x0B Authentication
wlan.fc.type_subtype == 0x1B Request to send
wlan.fc.type_subtype == 0x1C Clear to send
wlan.fc.type_subtype == 0x1D ACK
wlan.fc.type_subtype == 0x28  Qos data

 

adb root; adb shell wpa_cli -i p2p0 (remember "psk=*******")

set Channel & Bandwidth (channel/Bandwidth see https://en.wikipedia.org/wiki/List_of_WLAN_channels)

press START

Wireshark View -> Check "Wireless Toolbar"

in Toolbar click "802.11 preferences"

Decryption keys Edit..., press +

Key type: wpa_psk

Key: input "******"

click "OK"

展开阅读全文

没有更多推荐了,返回首页