This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

I have a peekremote style capture functioning (data from 3 Access points in sniffer mode being sent to my wireshark install on udp5555). Decode As->Peekremote works to open up the udp 5555 encapsulation and get me the 802.11 headers. I can see EPOL Key exhcanges, but cannot decrypt the 802.11 data after entering the proper wpa-pwd:Passphrase:SSID cobination. (that combination works if I do a raw sniff but I'm using the APs to gather remote data on all 3 channels).

Am I missing a step or is there some complexity in these multiple layers of encapsulation that causing me to fail to decrypt the 802.11 data?

Thanks!

asked 13 Jun '13, 11:18

whistj's gravatar image

whistj
11112
accept rate: 0%

Be the first one to answer this question!
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×139
×114
×36
×5
×4

question asked: 13 Jun '13, 11:18

question was seen: 2,472 times

last updated: 13 Jun '13, 11:18

p​o​w​e​r​e​d by O​S​Q​A