下表是利用 omnipeek 抓下約 3 秒鐘的無線包& q. H. i/ r) d9 q, v$ k
2 t- N( M' R, |# Y# j. C. ~動作:
. m7 L$ {/ V6 m: _! }3 x) T# n1) 啟動 Cisco AP,host 名為 Openplatform,2.4G Mac 地址為 00:19:07:58:9F:20,沒有加密,頻道為 9
" W7 X8 i/ ~" Z2 v0 g2) 利用 Summit 無線卡,啟動 CCX,連上 Cisco AP, 2.4G Mac 地址為 00:17:23:0D:2C:7D
" n: V0 m7 o3 t! E& m# p; t
* i: c. |% V7 a** 登入論壇後資料顯示更整齊 ***4 M) n- w% \4 f, d. \
/ v9 o, r7 M0 h" k* S: PPacketSourceDestinationData RateRelative TimeProtocol
( P' l# [# e5 \8 P2 q100:19:07:58:9F:20Ethernet Broadcast10802.11 Beacon
( F2 T& e2 }8 y$ ?" X3 n200:19:07:58:9F:20Ethernet Broadcast10.102401802.11 Beacon
) d+ \3 L3 a, F# H8 m) S n( |300:19:07:58:9F:20Ethernet Broadcast10.204804802.11 Beacon
6 A9 W/ F, `% D9 h7 ~, h' s400:19:07:58:9F:20Ethernet Broadcast10.307203802.11 Beacon
: f/ I+ E3 r* a+ M7 t4 ^6 T7 w500:19:07:58:9F:20Ethernet Broadcast10.409604802.11 Beacon
D% u! J1 k" f6 V0 o1 x g: I600:19:07:58:9F:20Ethernet Broadcast10.512005802.11 Beacon
& l8 p' G8 }* S) x, v0 _7 |700:19:07:58:9F:20Ethernet Broadcast10.614406802.11 Beacon# A$ m, A; a) @) }+ P* ~ {
800:19:07:58:9F:20Ethernet Broadcast10.716807802.11 Beacon
& X' q" a4 ]3 s- P$ J0 R900:19:07:58:9F:20Ethernet Broadcast10.819208802.11 Beacon( ?1 {, N( Z) I# S* q6 N- v& e2 L
1000:19:07:58:9F:20Ethernet Broadcast11.024009802.11 Beacon
! j- J: N, A8 q: V1 u) ^1100:19:07:58:9F:20Ethernet Broadcast11.12641802.11 Beacon
/ G [! g* c |1200:17:23:0D:2C:7DEthernet Broadcast11.175586802.11 Probe Req* R! C6 x# k$ `1 \: B7 w- ], ^
1300:17:23:0D:2C:7DEthernet Broadcast11.208822802.11 Probe Req4 U7 ?7 X. h ]/ r
1400:19:07:58:9F:20Ethernet Broadcast11.228811802.11 Beacon
4 X9 y- w' s9 S2 [. A1500:19:07:58:9F:20Ethernet Broadcast11.331212802.11 Beacon2 n: L" |1 k o# r# C; |
1600:17:23:0D:2C:7DEthernet Broadcast11.385512802.11 Probe Req- d$ \! ^: Y! ~) P4 [; Y4 _3 J; O
17Ethernet Broadcast00:19:07:58:9F:2011.422788802.11 Ack
) z9 _) @1 n1 ?1 k; ]4 V1800:19:07:58:9F:20Ethernet Broadcast11.433613802.11 Beacon
. q/ p+ R1 N( p3 |6 {1900:19:07:58:9F:2000:17:23:0D:2C:7D11.4586802.11 Probe Rsp0 B+ L5 }/ \. P+ M/ l
2000:19:07:58:9F:2000:17:23:0D:2C:7D11.460278802.11 Probe Rsp
7 |) ?. d5 B( v- y) \5 T! `0 {2100:17:23:0D:2C:7D00:19:07:58:9F:2011.460593802.11 Ack
& F' F+ `) p4 R w& V0 ~5 B2200:17:23:0D:2C:7D00:19:07:58:9F:2011.527452802.11 Auth, s- ?; y& H3 Q7 c& Q" h
2300:19:07:58:9F:2000:17:23:0D:2C:7D11.527764802.11 Ack/ U; l# b/ Q8 s9 E$ h
2400:19:07:58:9F:2000:17:23:0D:2C:7D111.528054802.11 Auth
1 {3 a1 u8 V0 i4 x2500:17:23:0D:2C:7D00:19:07:58:9F:2011.528362802.11 Ack
: E H9 X3 ], b0 D* |! ?2600:17:23:0D:2C:7D00:19:07:58:9F:2011.529416802.11 Assoc Req
6 _& q/ m1 E( `; a2700:19:07:58:9F:2000:17:23:0D:2C:7D11.529731802.11 Ack
0 R& c8 X/ |% h9 A2800:19:07:58:9F:2000:17:23:0D:2C:7D111.530343802.11 Assoc Rsp+ N- n* C2 E2 {1 ~( p3 }
2900:17:23:0D:2C:7D00:19:07:58:9F:2011.530655802.11 Ack$ s* s0 q; |6 V. r2 K
30192.168.21.54224.0.0.1111.531262IGMP8 [1 M4 J, n/ L# V. V' d2 d6 |4 d
31192.168.21.54224.0.0.1111.532943IGMP6 V$ {( t8 R4 \5 V! ]
3200:17:23:0D:2C:7D00:19:07:58:9F:20111.533059802.11 Ack
9 y* c" x2 r: X3300:19:07:58:9F:2000:17:23:0D:2C:7D111.533673WLCCP+ S4 o, E* \& ?; `6 m. J' l
3400:17:23:0D:2C:7D00:19:07:58:9F:20111.53379802.11 Ack
! d! y% ^4 o; v- ]5 P3 v5 Y3500:19:07:58:9F:20Ethernet Broadcast11.536016802.11 Beacon2 B! o8 E9 C, w0 K, e
3600:19:07:58:9F:20Ethernet Broadcast11.638414802.11 Beacon U2 L. L, T: d
3700:19:07:58:9F:20Ethernet Broadcast11.740816802.11 Beacon, w8 N% ~6 E4 j3 }) z
3800:19:07:58:9F:20Ethernet Broadcast11.843218802.11 Beacon0 n/ H& o1 L' z
3900:19:07:58:9F:20Ethernet Broadcast11.945617802.11 Beacon
: {( [1 M, s- R& Y. _ W4000:19:07:58:9F:20Ethernet Broadcast12.048018802.11 Beacon
! ]7 \6 |$ i* b4100:19:07:58:9F:20Ethernet Broadcast12.150419802.11 Beacon
& b L Y5 B C42192.168.21.54224.0.0.1112.172736IGMP
% |7 [" a7 h$ r4300:17:23:0D:2C:7D00:19:07:58:9F:20112.172852802.11 Ack
, N+ H+ B& V1 _* f9 _! R) N4400:19:07:58:9F:20Ethernet Broadcast12.25282802.11 Beacon4 B6 W# u& F) `* b
4500:19:07:58:9F:20Ethernet Broadcast12.355221802.11 Beacon
A( x9 x+ b, g4600:19:07:58:9F:20Ethernet Broadcast12.457622802.11 Beacon, i9 e2 u0 W5 r8 ^7 i5 U. z! I- N2 I$ S! ~' U- d- @
- E; F: Y* w+ Y) A+ n& Q
把一些無關痛癢的包不管,整個握手過程為包括 ( V5 t- l) e# a3 O! Q- [
Beacon1 L# k9 d% p* E* Q) e
802.11 Probe Req -> 802.11 Probe Rsp
4 g$ A2 w2 I( Y2 x) F802.11 Auth -> 802.11 Auth
! x I; q/ i5 ^# T3 i/ g' Z; Q802.11 Assoc Req -> 802.11 Assoc Rsp5 j7 M- J+ r6 X( d: F4 S7 b
$ Y! M5 J; E% ?) `; W2 h而每當Source 傳一個包給 Destination, Destionation 都會向 source 回應 802.11 Ack,這個暫不理,那麼我們把上表簡化為下表,跟著會詳細把每個包的重點提出來。
% c: ]& w* j6 Q/ A; ~; w" E: L7 V5 U' L
5 `2 v& [6 Q( i$ S4 W) n* wPacketSourceDestinationData RateRelative TimeProtocol
5 F' _, V2 u, t& {100:19:07:58:9F:20Ethernet Broadcast10802.11 Beacon
# {" i9 J2 [% Y. K5 n1600:17:23:0D:2C:7DEthernet Broadcast11.385512802.11 Probe Req
6 k ?7 c& q- Q; a: V* i2000:19:07:58:9F:2000:17:23:0D:2C:7D11.460278802.11 Probe Rsp: A( _6 K5 Y+ d8 B) l4 m( u/ L
2200:17:23:0D:2C:7D00:19:07:58:9F:2011.527452802.11 Auth( ^+ ]2 v* f3 ]1 [: \
2400:19:07:58:9F:2000:17:23:0D:2C:7D111.528054802.11 Auth) l* ~% @, ]* o
2600:17:23:0D:2C:7D00:19:07:58:9F:2011.529416802.11 Assoc Req0 H- _5 p9 A3 M6 O9 n2 I% k) F
2800:19:07:58:9F:2000:17:23:0D:2C:7D111.530343802.11 Assoc Rsp) h$ M9 x) }+ D- I7 @& Q' k |