下表是利用 omnipeek 抓下約 3 秒鐘的無線包
2 \% F) U/ I2 ~2 @: W9 N* D& r5 I* S3 J3 Y/ K+ _ Q9 F/ Q* I
動作:
$ r+ I, j9 I: C5 o1 E2 Y1) 啟動 Cisco AP,host 名為 Openplatform,2.4G Mac 地址為 00:19:07:58:9F:20,沒有加密,頻道為 9' Z& m6 O! U; ?+ X0 Q3 }
2) 利用 Summit 無線卡,啟動 CCX,連上 Cisco AP, 2.4G Mac 地址為 00:17:23:0D:2C:7D
( y% z* h0 N& S6 b5 i4 |0 [/ v ) s* S8 O1 b# _+ F* l3 Q$ d9 }
** 登入論壇後資料顯示更整齊 ***
& H5 H% v, C- \ B4 D% I! {- V# C, o) Z' m
PacketSourceDestinationData RateRelative TimeProtocol
! g- K- l8 U3 h+ ]" n100:19:07:58:9F:20Ethernet Broadcast10802.11 Beacon+ |: H0 C& h) I% U C) ^
200:19:07:58:9F:20Ethernet Broadcast10.102401802.11 Beacon. Y; f$ ], V0 k" C) t
300:19:07:58:9F:20Ethernet Broadcast10.204804802.11 Beacon
7 r5 U5 M, p! d400:19:07:58:9F:20Ethernet Broadcast10.307203802.11 Beacon" R- o% J4 y0 r) ]$ g5 A
500:19:07:58:9F:20Ethernet Broadcast10.409604802.11 Beacon: l" U2 |2 \3 Y( @3 [- F
600:19:07:58:9F:20Ethernet Broadcast10.512005802.11 Beacon- l4 y# F3 V3 m4 K; O" M, U) Z
700:19:07:58:9F:20Ethernet Broadcast10.614406802.11 Beacon
2 @ |% D) y3 r# E6 C) N800:19:07:58:9F:20Ethernet Broadcast10.716807802.11 Beacon* F5 a1 o' @6 \8 x
900:19:07:58:9F:20Ethernet Broadcast10.819208802.11 Beacon8 @' h$ ] J/ u
1000:19:07:58:9F:20Ethernet Broadcast11.024009802.11 Beacon( z0 o% u+ O Q" {/ j) z
1100:19:07:58:9F:20Ethernet Broadcast11.12641802.11 Beacon
' W: _" E: B/ I6 G( r4 ?6 f, ~1200:17:23:0D:2C:7DEthernet Broadcast11.175586802.11 Probe Req
5 {, n0 V$ ?/ }1 U4 i1300:17:23:0D:2C:7DEthernet Broadcast11.208822802.11 Probe Req
$ n, ?* k3 D0 e1400:19:07:58:9F:20Ethernet Broadcast11.228811802.11 Beacon% R$ ]+ v% a4 k2 I
1500:19:07:58:9F:20Ethernet Broadcast11.331212802.11 Beacon. `& e8 a0 q" [ Q# G3 a( A
1600:17:23:0D:2C:7DEthernet Broadcast11.385512802.11 Probe Req- d3 Z1 r; g, `3 |9 g7 C! h
17Ethernet Broadcast00:19:07:58:9F:2011.422788802.11 Ack
9 g7 T ~* n) g1800:19:07:58:9F:20Ethernet Broadcast11.433613802.11 Beacon [* p* X- j8 K8 f7 l$ c
1900:19:07:58:9F:2000:17:23:0D:2C:7D11.4586802.11 Probe Rsp) e& W0 n: ]5 m/ w' d
2000:19:07:58:9F:2000:17:23:0D:2C:7D11.460278802.11 Probe Rsp
v. @. ^( x8 d( ?9 Q2100:17:23:0D:2C:7D00:19:07:58:9F:2011.460593802.11 Ack
$ W4 I$ `3 F4 @* h0 Q2 j2200:17:23:0D:2C:7D00:19:07:58:9F:2011.527452802.11 Auth
# H `% B0 j+ z1 O' x$ F3 A2300:19:07:58:9F:2000:17:23:0D:2C:7D11.527764802.11 Ack
( x# ^3 W' h% R9 F2400:19:07:58:9F:2000:17:23:0D:2C:7D111.528054802.11 Auth9 }( v J3 Y9 h5 _$ s" ]
2500:17:23:0D:2C:7D00:19:07:58:9F:2011.528362802.11 Ack
( C6 [" R6 R; N: ~2600:17:23:0D:2C:7D00:19:07:58:9F:2011.529416802.11 Assoc Req4 y C. U& G; X, e8 V: \9 b
2700:19:07:58:9F:2000:17:23:0D:2C:7D11.529731802.11 Ack. R2 z% G! H6 f/ ?3 S0 Z
2800:19:07:58:9F:2000:17:23:0D:2C:7D111.530343802.11 Assoc Rsp
; V/ X1 ]& m. p7 g6 b/ T2900:17:23:0D:2C:7D00:19:07:58:9F:2011.530655802.11 Ack8 I& l' g% I3 Q; e
30192.168.21.54224.0.0.1111.531262IGMP" Y1 n0 b0 r1 T* |0 G" m, ]5 D J0 k
31192.168.21.54224.0.0.1111.532943IGMP
6 y, L# B% S- E6 J+ \+ p3200:17:23:0D:2C:7D00:19:07:58:9F:20111.533059802.11 Ack d# h( g2 M( E, c& h6 w, @
3300:19:07:58:9F:2000:17:23:0D:2C:7D111.533673WLCCP$ Y/ w2 N! A/ r# A% I6 V' [ T; h
3400:17:23:0D:2C:7D00:19:07:58:9F:20111.53379802.11 Ack/ O& T* u5 Y2 Z% X# N" G" F& P& [
3500:19:07:58:9F:20Ethernet Broadcast11.536016802.11 Beacon0 J8 Q. X$ W5 \$ r8 d3 C
3600:19:07:58:9F:20Ethernet Broadcast11.638414802.11 Beacon5 v# L z- C+ E r( S8 l
3700:19:07:58:9F:20Ethernet Broadcast11.740816802.11 Beacon
' S) f7 {2 M2 R% }+ k- `& O& a3800:19:07:58:9F:20Ethernet Broadcast11.843218802.11 Beacon
! C& K1 D0 W6 w3900:19:07:58:9F:20Ethernet Broadcast11.945617802.11 Beacon
/ U M0 m& p0 f Q4000:19:07:58:9F:20Ethernet Broadcast12.048018802.11 Beacon
K% z. X. W) w) M4100:19:07:58:9F:20Ethernet Broadcast12.150419802.11 Beacon
5 i+ i& k! g1 \. ?7 M ?42192.168.21.54224.0.0.1112.172736IGMP
) x; Z0 ?) \- c4 }7 H- _5 j7 [4300:17:23:0D:2C:7D00:19:07:58:9F:20112.172852802.11 Ack7 Z! Q1 v \) U, C* A3 n% }" T" t; s
4400:19:07:58:9F:20Ethernet Broadcast12.25282802.11 Beacon
T+ P- t! E! {# Y/ }4 o4500:19:07:58:9F:20Ethernet Broadcast12.355221802.11 Beacon
! C( ~( N% a" q2 ]4600:19:07:58:9F:20Ethernet Broadcast12.457622802.11 Beacon
. e, z1 S) Z& _- ^9 B6 C2 C: ?! N' r' v, F8 S, L/ s
& J C6 X2 j- U% b& v: k2 e. H把一些無關痛癢的包不管,整個握手過程為包括
+ r0 Z$ z* w! b. l8 oBeacon
# B1 F0 u/ K" r. D K4 m3 m1 p802.11 Probe Req -> 802.11 Probe Rsp
# \- q) U( A; e9 v0 A802.11 Auth -> 802.11 Auth
& ]5 F: o, P" _6 A5 R/ [3 t802.11 Assoc Req -> 802.11 Assoc Rsp
% u* p! B* K, Q' O1 @, g) m! K9 P3 Y0 `8 }" C! v
而每當Source 傳一個包給 Destination, Destionation 都會向 source 回應 802.11 Ack,這個暫不理,那麼我們把上表簡化為下表,跟著會詳細把每個包的重點提出來。* C3 T9 q5 s& B5 K8 [8 Y, f
F8 Q8 h" f9 Q. W* o/ S" ]8 a8 { v3 e: c
PacketSourceDestinationData RateRelative TimeProtocol) g2 x+ P, p6 e1 `5 X% ]
100:19:07:58:9F:20Ethernet Broadcast10802.11 Beacon
G* w+ z* V$ m* h- p8 }. Z+ L% \2 a1600:17:23:0D:2C:7DEthernet Broadcast11.385512802.11 Probe Req
' e. H! `/ V% z2000:19:07:58:9F:2000:17:23:0D:2C:7D11.460278802.11 Probe Rsp
& G3 ]+ x8 y# C0 c5 G2200:17:23:0D:2C:7D00:19:07:58:9F:2011.527452802.11 Auth
# ~0 e( O: \+ y2400:19:07:58:9F:2000:17:23:0D:2C:7D111.528054802.11 Auth
6 y$ T7 Z4 e# x* N. ~8 V* p, J2600:17:23:0D:2C:7D00:19:07:58:9F:2011.529416802.11 Assoc Req
" K5 [# L2 K& ^9 A2800:19:07:58:9F:2000:17:23:0D:2C:7D111.530343802.11 Assoc Rsp% c4 H5 f1 W( n9 q; @, P9 M |