If your network is "protected", meaning it's using WEP or WPA/WPA2, and encrypting packets, you would have to follow the instructions in the Wireshark Wiki page on decrypting 802.11 traffic. capture on an Ethernet link in promiscuous mode.įor the first one, you'd capture on the Atheros adapter, in monitor mode.capture on the Wi-Fi network in monitor mode.There would be two ways of capturing the iPod's traffic: That is all I can think of right now, if there is any additional info you need from me please let me know. So is it the realtek thing that has to support promiscuous mode in this case? I read that Atheros wifi adapters usually support promiscuous mode but I suppose that only works if the computer is connected via wifi? The hardwired computer was using Realtek PCIe FE family controller (no idea what that is) and had Atheros AR9485 802.11 b/g/n wifi adapter that was disconnected. Would this setup mean the hardwired computer could intercept the iPod data because the modem is acting like a hub or something? The computer (running Windows) that would be trying to monitor the iPod was hardwired to either one or the other, I can't remember. I used to have one of those popular Linksys WRT45G wireless router, which was connected to a Siemens Speedstream 4100 dsl modem. Now one of the things I was reading about was how promiscuous mode doesn't work with a switched network. I'll just tell you about the setup I used to have before SSL encryption became common place, just so I can relate easier. I'm not sure what detail I should include in this post, as promiscuous mode confuses the hell out me from reading about it online.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |