digininja Posted May 30, 2014 Share Posted May 30, 2014 In which case you would need to at least see the four way handshake to be able to decrypt traffic as it is in there that the key used to encrypt the traffic is generated. I don't know if wireshark can decrypt multiple streams on the fly even if you did have the handshake. I usually set the key in wireshark only for post processing pcap files. I'd suggest removing all encryption and starting there, when you understand how things are working at that level then think about adding encryption. Quote Link to comment Share on other sites More sharing options...
Skyrunner Posted May 30, 2014 Author Share Posted May 30, 2014 Okay, I'll do that. Thanks for the help Quote Link to comment Share on other sites More sharing options...
koolkarnt Posted June 16, 2014 Share Posted June 16, 2014 Ill give you an idea of how I started.My AP at home - connects all my little devices and computers. Taking my Kali VM, i plug in my TP-LINK WN 722N (USB) which becomes a wireless card inside kali only (mac doesnt recognise it)The VM is not in bridged mode or anything. it has no network connection to my AP, has no IP address. Now - using my TPLink card - I connect kali to my AP - i now have a IP address - at this point your now able to start seeing traffic on the network. at this stage you could use wireshark, or ettercap or a host of other apps that review the traffic....... what Im astonished is there is a course for this? now someone tells me. lol Quote Link to comment Share on other sites More sharing options...
Skyrunner Posted June 16, 2014 Author Share Posted June 16, 2014 Ill give you an idea of how I started. My AP at home - connects all my little devices and computers. Taking my Kali VM, i plug in my TP-LINK WN 722N (USB) which becomes a wireless card inside kali only (mac doesnt recognise it) The VM is not in bridged mode or anything. it has no network connection to my AP, has no IP address. Now - using my TPLink card - I connect kali to my AP - i now have a IP address - at this point your now able to start seeing traffic on the network. at this stage you could use wireshark, or ettercap or a host of other apps that review the traffic. ...... what Im astonished is there is a course for this? now someone tells me. lol I don't think it's going to cover just things like sniffing but rather the ethics and a load of other stuff. Here's what we're going to be studying:http://www.ljmu.ac.uk/courses/undergraduate/2014/cyber-security Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.