I have a network, which has 2 nodes (a phone, a MacBook) both are connected to same wireless network, I know the SSID and password for the wireless network
I am currently running Wireshark on MacBook with following settings:
and to decrypt traffic under
I start it in capture mode: I make a http call to foobar.com from my phone, and I expected wireshark to pick it up and display in sniffed data, I don't see it there. However, if I make same HTTP call to foobar.com from my mac, I can see it being listed. Edit: After that I see EAPOL handshake captured but still it is not able to decrypt packets captured for that source (Lg_Electr_41), also attached protocol preference good capture of EAPOL asked 27 Feb '15, 10:59 annonymous edited 01 Mar '15, 21:34 |
One Answer:
Could it be that you forget to disconnect the phone after you started Wireshark? Wireshark can only decrypt the traffic of any other device in the wireless network if Wireshark could sniff the EAPOL packets of this device. In the eapol packets the session key of the device (your phone e.g.) and the AP is handled. If your phone is connected with the AP and then you start Wireshark after, there is no way to read the traffic you will only be able to capture the raw and encrypted packets. So if this was the case (that no eapol packets were sniffed), disconnect your phone, start wireshark, connect your phone to the AP, look if Wireshark got the 4 eapol packets (you can filter them), and only then you can read the traffic of your phone. answered 28 Feb '15, 23:34 franc showing 5 of 20 show 15 more comments |
Thanks for your reply franc, I was able to capture EAPOL packets, still it is not able to decrypt rest of the packets, please see edit in question
Did you see all 4 EAPOL Handshake packets? Also the "Malformed Packet" irritates me.
Yes I saw 5 one of them was malformed, it was able to capture all 4 good packets
In monitor mode, even packets with a bad FCS are handed to the host, and perhaps one of the EAPOL packets was damaged by the microwave oven or something such as that. :-) If the malformed packet shows a bad FCS, that's probably what happened.
@Guy Thanks a lot for your help across stackexchange and in here - You are the man, This time I turned off microwave, also asked neighbors to turned off theirs ;) - recaptured EAPOL and updated screenshots
@Guy I verified on different network, it works there with same setup, only thing I see difference is security type is : wpa2 psk, and in the network where I was trying it was: WPA2 Personal, reported by client, not sure what is the difference and does it actually help
In your edited screenshot I only see one eapol: "Message 1 of 4" but not the rest of the four neccessary eapol packets. Means that you need 1 of 4, 2 of 4, 3 of 4 and 4 of 4 to have captured all needed eapol packets. Thats how it shows in my wireshark on my mac, if i successfully capture the eapol.
At least according to the Wikipedia, WPA-Personal and WPA-PSK are the same thing.
@franc I will try to capture it again and update here, thanks for your help Guy, franc, could you brief me about how EAPOL thing plays part in encryption between router and node ?
This is maybe a good explanation: http://en.wikipedia.org/wiki/IEEE_802.1X#Typical_authentication_progression
And, for details on the 4-way EAPOL handshake, see RFC 4764 - that's an RFC, so perhaps not as good a tutorial as you might like, so see also this StackExchange question and its answers.
@Guy another difference I noted was, my phone gets connected to 2.4Ghz and my Mac gets connected over 5Ghz band, does it make difference ?
forced phone to join 5Ghz and still it is not able to decrypt HTTP protocols, some of the packets sourced from phone are decrypted with protocol=SSDP and it is making HTTP request to some where (not to foobar.com), another difference noted was: phone was listed under mode :
802.11ac
in router's web console, and mac was listed under802.11an
, both at 5GhzYes, just as if you tune your FM radio to 89.7 MHz, it's not going to play a radio station broadcasting at 94.1 MHz. A Wi-Fi adapter includes a radio, and it will only receive signals in the right frequency band. I don't know whether any Wi-Fi adapters exist that can receive on more than one band simultaneously, capturing packets on both the 2.4 GHz and the 5 GHz band.
ok and do you think 802.11ac and 802.11an makes difference ?
Don't force your phone to join the 5 GHz channel, but force your Mac to join the 2.4 Wifi Channels, let them both traffic under 2.4 GHz. Maybe Wireshark doesn't work well on the 5 GHz, but it is working on 2.4 GHz so test this first.
Wireshark doesn't care about 2.4 GHz vs. 5 GHz, so that's not the issue.
However, the adapter may care about 802.11ac vs. 802.11a/802.11n. 802.11ac only operates in the 5 GHz band, as does 802.11a; 802.11n can operate in either the 2.4 GHz or 5 GHz band.
Hardware that supports 802.11n but not 802.11ac will not be able to receive any 802.11ac traffic and thus will not be able to sniff any 802.11ac traffic; I don't know whether your MacBook can support 802.11ac or not (according to the Wikipedia MacBook Pro article, 11ac support first showed up in October 2013, so earlier MacBook Pros wouldn't support it, and the MacBook Air article indicates that 11ac support also showed up in mid-2013).
Switching to the 2.4 MHz band should, it appears, force the phone to use 802.11n, so that might allow the Mac to receive its traffic.
I will give it a test from longer distance (to force mac use 2.4Ghz) and see if it switches to use
ac
, and update you guys soon, thank you so much againThat comment appears to have disappeared, but, if it's true that the MacBook was on 802.11ac and the phone was on 802.11a/802.11n (there's no "802.11an"; "an" refers to 802.11a and 802.11n, the first of which uses only the 5 GHz band and the latter of which can use either the 2.4 GHz or the 5 GHz band), then the MacBook should be able to capture the phone's traffic as long as they're both using the same band and channel within that band.
If the phone was using ac and the MacBook was using a or n, then the MacBook probably wouldn't be able to capture the phone's traffic.
I couldn't force switch mac to use particular protocol, it is working on another network, I assume the culprit is only this protocol difference, I will mark it as accepted, Thanks a lot for your help @Guy @franc