当前位置:网站首页>How Wireshark decrypts WiFi data packets
How Wireshark decrypts WiFi data packets
2022-06-12 05:28:00 【Gradually every day, I miss my hometown a little more】
our wifi Packets if you don't choose open model It's all encrypted , How can we make use of wireshark To decrypt data Bao Er ?
Here we will briefly talk about .
Premise : You know, wifi Encryption method of ,ssid , key.
open wireshark Start the bag. Generally, it is unlikely that the network card must support sniffer mode So it's commonly used ominpick To catch , And then connect client. Remember to catch client and ap Between key Communication package . That is to say key The four time hand package . Otherwise, there is no way to decrypt .
Use wireshark Got it wifi If the packet is encrypted , Only ciphertext can be displayed , Can't get real data .

If you know AP and SSID and key, You can decrypt it wifi Data packets , Display the data of the upper layer protocol .
stay wireshark Set as follows :
Edit -> Preferences -> Protocols -> IEEE802.11 -> Edit.
Click on “+” Create a new one entry, With my AP For example ,Key type choice wps-psk,key fill (key:SSID).
The specific steps are shown in the figure :




Note here that there may be SSID:key form , This is because wpa-psk The encryption key By key and ssid as well as anounce number Come together , This is why we must 4 various key Exchanged packets take anouce number Of .
Set the , Click on ok that will do !
边栏推荐
- 按键精灵的简单入门
- Force/release learning and sorting in IC Verification (6) research on the influence of wire type signals
- yolov5
- Introduction to MMS memory optimization of Hisilicon MPP service
- Sv806 QT UI development
- JS to determine whether the tags of multiple classes are empty
- Self implementation of a UI Library - UI core drawing layer management
- Calculation method notes for personal use
- National land use data of 30m precision secondary classification
- Legal liabilities to be borne by the person in charge of the branch
猜你喜欢

Thingsboard create RCP widget

It costs less than 30 yuan, but we still don't build it quickly - check the small knowledge of software application

Matlab: halftone and dither conversion

个体工商户是不是法人企业

Nature | make an account of the new crown casualties in the world

How to deploy dolphin scheduler Apache dolphin scheduler 1.2.0 in cdh5.16.2

Detailed tutorial on the use of yolov5 and training your own dataset with yolov5

38. appearance series

What is the project advance payment
![[cjson] precautions for root node](/img/6c/4462bc8126935f00a5c64f18de13ea.png)
[cjson] precautions for root node
随机推荐
When the build When gradle does not load the dependencies, and you need to add a download path in libraries, the path in gradle is not a direct downloadable path
Nbiot module me3616 at command mqtt connecting thingsboard
MySQL5.7.21 Build For ARM
Rv1109 lvgl UI development
JS disable mobile sharing
Multi thread learning v. volatile visibility and cache inconsistency, instruction reordering
Automated testing - Po mode / log /allure/ continuous integration
【C语言】实现字符串截取功能
Overview of common classes
Force/release learning arrangement in IC Verification (5) research on the influence of reg type signals
IC验证中的force/release 学习整理(6)研究对 wire 类型信号的影响
Yolo opencv scale identification scale reading identification water gauge identification water level identification source code
深入理解异步编程
Pupanvr- an open source embedded NVR system (1)
Sentinel-2 data introduction and download
利用jieba库进行词频统计
Nature | 给全球的新冠伤亡算一笔账
PHP实现图片登录验证码的解决方案
Minigui3 runs on Hisilicon hi3520d/hi3531 platform
JS controls the display and hiding of tags through class