Hey, I know this question gets asked a lot but im lost and I need it for a presentation tomorrow so I have to ask. Help is really appreciated, thanks for your time! I hope this question wasnt too dumb asked 17 Jan '16, 10:11 Nakroma showing 5 of 20 show 15 more comments |
2 Answers:
To lift the plain answer up from the chain of comments: It is not enough to configure the table of decryption keys properly and to capture also the EAPOL handshake, it is also necessary to make sure that the "enable decryption" checkbox in the IEEE 802.11 protocol settings is ticked. answered 19 Jan '16, 06:39 sindy |
You have to capture the four EAPOL packets, before you can decrypt the WLAN traffic. As it is described here: https://wiki.wireshark.org/HowToDecrypt802.11
answered 17 Jan ‘16, 11:03 Christian_R edited 17 Jan ‘16, 11:07 |
http
as capture filter or as display filter?sindy Yes, I capture a lot of packets. I used as a display filter (the one above the packet list). And I just relogged the phone into the wifi and tried again, but no http packets are being captured.
In that case, either something is wrong with the way you've configured the WPA password in Wireshark, or the web page you've visited from the phone was not plain http but https, so there was double encryption, one for the wireless transmission (between the phone and the AP) and one for the phone to web server transmission. Can you see any packets if you apply a display filter
tcp.dstport == 443
instead ofhttp
on the capture?If you want more help, you have to post your capture file somewhere, provide a link to it here, and give the WPA password here as well. To do so, you'll probably prefer to change the WPA password before capturing, so that you wouldn't publish the one you use normally.
sindy That could be possible. Nothing shows up with tcp.dstport either. The site I visited is not https (just checked). Here the capture file: www.filedropper.com/capture_6 My WPA password is YJHGBQXC and my SSID is UPC2323467
Are you really sure you have logged off and on the WiFi network from the Samsung phone after starting the capture? The easiest and most reliable way to do so is to disable the WiFi completely and then enable it again. As @Christian_R has pointed out, the EAPOL handshake (which happens when the phone is logging in to the WiFi) is missing in your capture.
Ah I misread, I restarted it before the capture. I tried it again, going into the wifi after starting the capture. I checked, the EAPOL packets are there, but still no WiFi/TCP.dstport stuff. Heres the new capture file: www.filedropper.com/capture_7
This time it works for me... have you added the
PASSWORD:KEY
aswpa-psk
orwpa-pwd
type to the IEEE80211 key list?wpa-pwd
is correct, with contentsYJHGBQXC:UPC2323467
. If you did it wrong, don't forget to remove the previous item, and better save the capture file, exit Wireshark and open the capture file again. The key list is saved automatically between Wireshark runs, to the profile, no need to care about it.It works for you? Thats weird. Heres a screenshot of my key list: http://epvpimg.com/0D6Ae.png
Lol never mind, I missed the enable decryption field. I feel retarded. It actually works now! Thanks a lot :)
Could you please check "enable decryption" in the window from which you open the key list (seen at your screenshot above the key list window).
Yeah I just noticed it too lol. Thank you very much, works perfectly
Yes, that was it. However, what I don't like are two points:
Assume packets have FCS
andValidate the FCS checksum if possible
protocol preferences makes Wireshark decrypt those packets.Therefore I hereby ask whether I may use the capture & the password:ssid information to file a bug at Wireshark? Because it is hard to believe that this error would be outside Wireshark.
UPCddddddd
(seven digits) as default SSID.Yeah you can. And thanks for making me aware of that security leak
Done... and my apologies, I really wrote you should restart the WiFi connection before starting the capture in my very first comment, which was of course wrong. The reason why it is necessary to capture the EAPOL handshake is that the WPA password is not used to encrypt the complete traffic but only to encrypt the EAPOL handshake, which is an exchange of the actual session keys which are randomly generated for each new session.
Hey sindy, I researched a bit about the UPC thing. Are you sure theres actually a whole program to do that? Any article I found said you'd have to brutforce the password
I hope I won't get a ban for life for posting such a thing here, but the source code of that SSID->default password converter was still available at
http://haxx.in/upc_keys.c
five minutes ago (and called "password recovery tool").Up to the local (Czech) online media, which have drawn my attention to the issue, two device types are affected: TC7200 (Technicolor) and UbeeEVW3226. The MAC address prefix in your capture indicates that yours is Technicolor, but not necessarily a 7200.
If you call trying out which of the 8 generated passwords is the correct one a "brute force attack", then OK, you need brute force :)
Someone has even taken the effort to make it a web application...
https://upc.michalspacek.cz/UPC2323467
And OK, it is not 8 candidate passwords - depending on the frequency band you've activated at the AP, it is 18 passwords to try for 2.4 GHz and 27 for 5 GHz, because it seems that the manufacturing series (which the attacker cannot find from the SSID) also plays a role.
Alright, thanks for your help :)
Coming back for details about your laptop, because the core developer of the wlan dissector says that it looks as if the packets from the router were really corrupt. As the phone obviously liked them, the only place other than Wireshark itself where they could be corrupt is the wireless card and its driver used in monitoring mode.
So can you please state what vendor and model it is, and if you know that, what wireless adapter it uses and what driver for the wireless adapter you have used?
Sure! Its a Samsung NP300E5C. The network adapter is Qualcomm Atheros AR9485. No idea what my driver is tho, it only shows my graphics driver in the manager.