這裡記錄一下當使用者設定成Static WEP – Open System的時候,它的封包流程和內容長什麼樣子。
AP MAC Address: E8:C7:CF:AF:5C:C0
STA MAC Address: C0:FF:D4:D4:E9:BA
Security: Static WEP
Authentication: Open System / Shared Key
Key Length: 64-bit / 128-bit
Key Type: ASCII / Hex
Key Index: 1
Key1 / 2 / 3 / 4: ABCDE / N / A / N / A / N / A
#4449: The STA send Probe Request.
#4486: The AP feedback Probe Response.
#4471: The STA send Authentication (request) to AP.
#4521: The AP feedback Authentication (response) to STA.
#4523: The STA send Association Request to AP.
#4527: The AP feedback Association Response to STA.
#4471: The STA send Authentication (request) to AP.
#4521: The AP feedback Authentication (response) to STA.
找一個Data封包 #4558 看一下內容:
它會告訴你Protected Flag: Data is protected;且下面還多了WEP Parameters的相關參數,告訴你這個資料封包是用WEP方式加密。而加密內容是一堆亂碼。然後我們用WireShark來解密WEP:
原來這是一個ICMPv6的封包!所以,Static WEP – Open System和NONE Security的流程和封包非常相似,差別在於Data封包是否有加密。
Related:
沒有留言:
張貼留言