Preview

wireshark

Satisfactory Essays
Open Document
Open Document
452 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
wireshark
Wireshark Wireless
Fred Grouper
Kaplan University
Systems Analysis and Design
MSIT 530
Professor Robert
March 3, 2013

Wireshark Wireless Capture

Source MAC addresses, destination MAC addresses

This screen shot shows the source address of the workstation and a destination address representing a broadcast transmission for the beacon.

This screen shot shows the source and destination packet of the 802.11 packet

State of protection and the authentication algorithm used by the AUTHENTICATION packet.

This screen shows that the Authentication Algorithm is Open System and the packet is not protected.

Cipher suites and authentication keys offered by the AUTHENTICATION packet.

This screen shows the authentication under the tag section of the Microsoft WPA information.
This screen also shows the source address of the Authentication packet beginning the authentication as the workstation.

Which system sent the ASSOCIATION packet:

The destination address is set to 00:18:39:f5:ba:bb which is the address of the endpoint.
The source address is 00:13:02:d1:b6:4f and this is the address of the transmitter and the transmitter is an AP as shown on the screen therefore the send of the association packet is the Access Point.

The 802.11 protocol is more complicated than your standard Ethernet protocol. The wireless protocol must deal additional requirements relating to the connectivity to the access point.
The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location.
Another area of interest was the information that is transmitted to the access points themselves. Understanding



References: Dean, T. ( 2013). Comptia network+ n10-005 in depth. [Books24x7 version] Retrieved from http://common.books24x7.com.lib.kaplan.edu/toc.aspx?bookid=47482.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Week 5 6 ILAB SriLakshmi

    • 773 Words
    • 3 Pages

    3. What do you think the Wireless LAN control traffic received by the roaming 11b node when it is in the engineering building is composed of?…

    • 773 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4

    • 1313 Words
    • 6 Pages

    A network administrator issues the command show ip route and observes this line of output:…

    • 1313 Words
    • 6 Pages
    Good Essays
  • Best Essays

    IEEE 802.11 – Wireless LAN • http://www2.rad.com/networks/2005/wirelesslan/main.htm • Up-to-date information on Wireless LANs. Technical/Magazines Articles…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    The information that it’s giving me is that its showing the wireless networks around my area. A security key.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Click on the Advanced button and then the TCP/IP tab to see the IP address on the right of the…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | |containing the station ID and an|tools to launch attacks on the network.|however it is important to |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Study Guide

    • 1194 Words
    • 5 Pages

    9. What is the frequency range used by 802.11a, and what modulation technique is used?…

    • 1194 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?…

    • 778 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Wireshark

    • 512 Words
    • 3 Pages

    Organizing a new government is not an easy task. You cannot make everyone happy because everyone has different views and opinions. No one person sees a topic the same as another person. So when coming up with a system for a new government for a country you have many decisions that must be made. There is a country that needs a new government: We will call this country Anation. Anation is a country that has several religious factions. “The interconnection between religion and government is inevitable because in varying degrees both institutions are involved in regulating social behavior (unknown, para 2).” Religion is an important factor to consider when creating a new government because people’s views are tied to their religious beliefs generally speaking. Setting up a new government system for Anation is a difficult and slow task.…

    • 512 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You are physically close enough to receive both access point and wireless client packets. The wireless card strength is typically less then the AP strength.…

    • 845 Words
    • 4 Pages
    Good Essays
  • Good Essays

    nokia secret codes

    • 1479 Words
    • 6 Pages

    *#62209526# – Display the MAC address of the WLAN adapter. This is available only in the newer devices that support WLAN…

    • 1479 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Nokia 2007 Strategy

    • 3120 Words
    • 13 Pages

    Signals Flash provides timely information and analysis on major wireless events as they occur. It is a complimentary research bulletin that is intended for the clientele of Signals Research Group, LLC and the subscribers of its Signals Ahead newsletter. For additional information about SRG and the various research and consulting services that we offer, please visit our web site at www.signalsresearch.com.…

    • 3120 Words
    • 13 Pages
    Powerful Essays