Fred Grouper
Kaplan University
Systems Analysis and Design
MSIT 530
Professor Robert
March 3, 2013
Wireshark Wireless Capture
Source MAC addresses, destination MAC addresses
This screen shot shows the source address of the workstation and a destination address representing a broadcast transmission for the beacon.
This screen shot shows the source and destination packet of the 802.11 packet
State of protection and the authentication algorithm used by the AUTHENTICATION packet.
This screen shows that the Authentication Algorithm is Open System and the packet is not protected.
Cipher suites and authentication keys offered by the AUTHENTICATION packet.
This screen shows the authentication under the tag section of the Microsoft WPA information.
This screen also shows the source address of the Authentication packet beginning the authentication as the workstation.
Which system sent the ASSOCIATION packet:
The destination address is set to 00:18:39:f5:ba:bb which is the address of the endpoint.
The source address is 00:13:02:d1:b6:4f and this is the address of the transmitter and the transmitter is an AP as shown on the screen therefore the send of the association packet is the Access Point.
The 802.11 protocol is more complicated than your standard Ethernet protocol. The wireless protocol must deal additional requirements relating to the connectivity to the access point.
The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location.
Another area of interest was the information that is transmitted to the access points themselves. Understanding
References: Dean, T. ( 2013). Comptia network+ n10-005 in depth. [Books24x7 version] Retrieved from http://common.books24x7.com.lib.kaplan.edu/toc.aspx?bookid=47482.