This is our old Q&A Site. Please post any new questions and answers at


I'm dealing with a proprietary wireless protocol. It uses something similar to WPA, but does not use standard EAPOL handshakes. When I enter the WPA2 password in wireshark for decryption, since it doesn't see the EAPOL handshakes, it can't determine the Pairwise Temporal Key. I have the PTK, but it appears there is no way to enter it in manually in wireshark. Is there any way to do this? Any modified versions of wireshark that allow this?

asked 11 Aug '14, 08:40

NickZ's gravatar image

accept rate: 0%

I'm dealing with a proprietary wireless protocol.
Any modified versions of wireshark that allow this?

As that's a proprietary wireless protocol, you'll need a proprietary version of Wireshark, meaning you need to change the wifi dissector code (including decryption) to make that happen.


permanent link

answered 11 Aug '14, 09:18

Kurt%20Knochner's gravatar image

Kurt Knochner ♦
accept rate: 15%

Right, that's why I'm wondering if anyone has done this before and can make their changes available?

(11 Aug '14, 09:20) NickZ

I don't think so. How big is the chance that anybody uses the same proprietary wireless protocol than you, especially as you did not even mention what's exactly proprietary within that protocol and how the protocol looks like !?!

(11 Aug '14, 09:29) Kurt Knochner ♦
Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here



Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text]( "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:


question asked: 11 Aug '14, 08:40

question was seen: 1,479 times

last updated: 11 Aug '14, 09:30

p​o​w​e​r​e​d by O​S​Q​A