This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Hi,

I'm dealing with a proprietary wireless protocol. It uses something similar to WPA, but does not use standard EAPOL handshakes. When I enter the WPA2 password in wireshark for decryption, since it doesn't see the EAPOL handshakes, it can't determine the Pairwise Temporal Key. I have the PTK, but it appears there is no way to enter it in manually in wireshark. Is there any way to do this? Any modified versions of wireshark that allow this?

asked 11 Aug '14, 08:40

NickZ's gravatar image

NickZ
11112
accept rate: 0%


I'm dealing with a proprietary wireless protocol.
Any modified versions of wireshark that allow this?

As that's a proprietary wireless protocol, you'll need a proprietary version of Wireshark, meaning you need to change the wifi dissector code (including decryption) to make that happen.

Regards
Kurt

permanent link

answered 11 Aug '14, 09:18

Kurt%20Knochner's gravatar image

Kurt Knochner ♦
24.8k1039237
accept rate: 15%

Right, that's why I'm wondering if anyone has done this before and can make their changes available?

(11 Aug '14, 09:20) NickZ

I don't think so. How big is the chance that anybody uses the same proprietary wireless protocol than you, especially as you did not even mention what's exactly proprietary within that protocol and how the protocol looks like !?!

(11 Aug '14, 09:29) Kurt Knochner ♦
Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×165
×139
×134
×36

question asked: 11 Aug '14, 08:40

question was seen: 1,362 times

last updated: 11 Aug '14, 09:30

p​o​w​e​r​e​d by O​S​Q​A