![]() ![]() On the rpi, over a period of one minute, with my phone streaming youtube, I managed to capture about 200 packets, many of which were just small 801.11 control frames (beacon, etc.) When the same card, connected to my laptop and I run wireshark, I captured almost 10,000 packets in the same timeframe (still streaming youtube). I am using an Alfa AWUS036H wifi adapter for capturing. * 5700 MHz (20.I am doing wireshark/packet sniffing stuff on the rpi. * 5690 MHz (20.0 dBm) (no IR, radar detection) * 5680 MHz (20.0 dBm) (no IR, radar detection) * 5670 MHz (20.0 dBm) (no IR, radar detection) * 5660 MHz (20.0 dBm) (no IR, radar detection) * 5650 MHz (20.0 dBm) (no IR, radar detection) * 5640 MHz (20.0 dBm) (no IR, radar detection) * 5630 MHz (20.0 dBm) (no IR, radar detection) * 5620 MHz (20.0 dBm) (no IR, radar detection) * 5610 MHz (20.0 dBm) (no IR, radar detection) * 5600 MHz (20.0 dBm) (no IR, radar detection) * 5590 MHz (20.0 dBm) (no IR, radar detection) * 5580 MHz (20.0 dBm) (no IR, radar detection) * 5570 MHz (20.0 dBm) (no IR, radar detection) * 5560 MHz (20.0 dBm) (no IR, radar detection) * 5550 MHz (20.0 dBm) (no IR, radar detection) * 5540 MHz (20.0 dBm) (no IR, radar detection) * 5530 MHz (20.0 dBm) (no IR, radar detection) * 5520 MHz (20.0 dBm) (no IR, radar detection) * 5510 MHz (20.0 dBm) (no IR, radar detection) * 5500 MHz (20.0 dBm) (no IR, radar detection) * 5320 MHz (20.0 dBm) (no IR, radar detection) * 5310 MHz (20.0 dBm) (no IR, radar detection) * 5300 MHz (20.0 dBm) (no IR, radar detection) * 5290 MHz (20.0 dBm) (no IR, radar detection) * 5280 MHz (20.0 dBm) (no IR, radar detection) * 5270 MHz (20.0 dBm) (no IR, radar detection) * 5260 MHz (20.0 dBm) (no IR, radar detection) HT TX/RX MCS rate indexes supported: 0-15, 32 Minimum RX AMPDU time spacing: 2 usec (0x04) Maximum RX AMPDU length 65535 bytes (exponent: 0x003) ![]() Show capabilities of the wireless PHY hardware: $ iw phy phy0 info There are a variety of commands in Linux to learn more about your wireless network interface and nearby access points. You should see 'Message n of 4' printed 4 times for each client. You can check if you captured the 4-way handshake by using a Wireshark filter of eapol. Other filters let you dig into the specific frame types: Frame Typeįor Wireshark to decrypt client traffic using the key you entered, it must capture the initial 4-way handshake.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |