This is our old Q&A Site. Please post any new questions and answers at


We'd like to know if it's possible to decode UDP packets sent by Cisco APs on port 5555 in command line and also apply a filter for probe requests. If so, what would be the syntax?. Thanks in advance.

Kind Regards, Enrique

asked 20 Feb '14, 03:15

eroques's gravatar image

accept rate: 0%


If you right-click an example packet in Wireshark, select "Decode As" and select "AIROPEEK". If you're using Wireshark 1.8 or later, that would be "PEEKREMOTE".

For a display filter, you should be able to use "wlan.fc.type_subtype == 0x04 || wlan.fc.type_subtype == 0x05" to grab the probe request/response exchanges. After the Airopeek header it's just normal 802.11.

For the command line question, if you meant Tshark, something like:

tshark -i {interface} -R 'wlan.fc.type_subtype == 0x04 || wlan.fc.type_subtype == 0x05' -d udp.port==5555,airopeek

permanent link

answered 26 Feb '14, 18:12

Quadratic's gravatar image

accept rate: 13%

Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here



Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text]( "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:


question asked: 20 Feb '14, 03:15

question was seen: 2,821 times

last updated: 26 Feb '14, 18:12

p​o​w​e​r​e​d by O​S​Q​A