12.30.2023

Static WEP - Shared Key Mode

這裡記錄一下當使用者設定成Static WEP – Shared Key的時候,它的封包流程和內容長什麼樣子。
從上頭的流程圖可以得知:NONE Security和Open System只有2道認證;而Shared Key則是需要4道

AP MAC Address: E8:C7:CF:AF:59:40
STA MAC Address: 80:86:F2:83:07:0C

Security: Static WEP
Authentication: Open System / Shared Key
Key Length: 64-bit / 128-bit
Key Type: ASCII / Hex
Key Index: 1
Key1 / 2 / 3 / 4: ABCDE / N / A / N / A / N / A
#619: The STA send Authentication (request) to AP.
#627: The AP feedback Authentication (response) with cleartext challenge (口令盤查) to STA.
#625: The STA send Authentication (request) with encrypted cleartext challenge (WEP加密過的口令盤查) to AP.
#629: The AP feedback Authentication (response) to STA.
#631: The STA send Association Request to AP.
#634: The AP feedback Association Response to STA.

這一次偷懶,並沒有抓AP和STA的Probe Request / Response封包,因為這本來就會有的;直接從Authentication開始抓。其中#627和#625的順序剛好對調,這是因為接收封包的軟體順序的問題,並不代表AP和STA的行為錯誤

#619: The STA send Authentication (request) to AP.
Authentication Algorithm現在是設定成 Shared Key (1)

#627: The AP feedback Authentication (response) with cleartext challenge (口令盤查) to STA.
AP回覆128 Bytes的Challenge Text。

#625: The STA send Authentication (request) with encrypted cleartext challenge (WEP加密過的口令盤查) to AP.
這一個封包已經先行經過WEP解密,所以才看的到封包內容。STA也回覆128 Bytes的Challenge Text,但是有經過WEP加密過

#629: The AP feedback Authentication (response) to STA.
最後一個封包,AP回覆Status Code: Successful (0x0000),表示認證成功。留意這四組封包:#619#627#625#629,它們的Authentication SEQ依序為:0x00010x00020x00030x0004,也表示這一個完整的認證過程。再補充IEEE 802.11對Authentication Algorithm的規範:
Refer: CWSP-Legacy 802.11 Security

Related:

沒有留言:

張貼留言