Hi, Now that in the developments build there is a fix to get the eapol keys (and in fact the regular trafic) inside the CWIDS frames would it be possible to decrypt the 802.11 trafic inside these frames? For now I use a basic python script using scapy to rebuild another pcap file and then I use Wireshark on this new file. This is both painful and long to process with huge captures. Is anyone aware of a better/faster solution that would be directly integrated inside Wireshark? Or will this feature be deploy in a near future directly into the application? Thanks in advance, asked 01 Jul '16, 00:26 Yonibley |