Hi, I'm dealing with a proprietary wireless protocol. It uses something similar to WPA, but does not use standard EAPOL handshakes. When I enter the WPA2 password in wireshark for decryption, since it doesn't see the EAPOL handshakes, it can't determine the Pairwise Temporal Key. I have the PTK, but it appears there is no way to enter it in manually in wireshark. Is there any way to do this? Any modified versions of wireshark that allow this? asked 11 Aug '14, 08:40 NickZ |
One Answer:
As that's a proprietary wireless protocol, you'll need a proprietary version of Wireshark, meaning you need to change the wifi dissector code (including decryption) to make that happen. Regards answered 11 Aug '14, 09:18 Kurt Knochner ♦ |
Right, that's why I'm wondering if anyone has done this before and can make their changes available?
I don't think so. How big is the chance that anybody uses the same proprietary wireless protocol than you, especially as you did not even mention what's exactly proprietary within that protocol and how the protocol looks like !?!