下表是利用 omnipeek 抓下約 3 秒鐘的無線包
' d% i, z. Q0 y! l/ O$ p1 W! I
& v+ P. G$ \" q& t r0 A動作:, z, M' R( z1 S( B7 Y' Q/ b- ?
1) 啟動 Cisco AP,host 名為 Openplatform,2.4G Mac 地址為 00:19:07:58:9F:20,沒有加密,頻道為 9
4 I+ \0 R. @. {$ @! \2) 利用 Summit 無線卡,啟動 CCX,連上 Cisco AP, 2.4G Mac 地址為 00:17:23:0D:2C:7D) u! @8 F) ?4 V1 \7 v3 ?; j$ s
# S( _. t F7 y** 登入論壇後資料顯示更整齊 ***
" u. L! u7 t& L' V6 Q' `9 v. x
PacketSourceDestinationData RateRelative TimeProtocol
+ T: G* @3 m, {! d O& V. d& l" O& s100:19:07:58:9F:20Ethernet Broadcast10802.11 Beacon* _& [6 P* a, i- c5 l
200:19:07:58:9F:20Ethernet Broadcast10.102401802.11 Beacon+ U# Y: U& o$ r0 s# W( m
300:19:07:58:9F:20Ethernet Broadcast10.204804802.11 Beacon
3 u: ^& p$ L' U+ s I400:19:07:58:9F:20Ethernet Broadcast10.307203802.11 Beacon
0 H+ ?) Q7 h3 V0 V; q. J$ z J500:19:07:58:9F:20Ethernet Broadcast10.409604802.11 Beacon" @! m( C; \) n# O1 {# \
600:19:07:58:9F:20Ethernet Broadcast10.512005802.11 Beacon8 H {1 `" {6 ^& A
700:19:07:58:9F:20Ethernet Broadcast10.614406802.11 Beacon! L9 K( r" R# T( T1 q: [$ z! _9 P
800:19:07:58:9F:20Ethernet Broadcast10.716807802.11 Beacon! T3 D4 o1 E1 E. H" h" [* v
900:19:07:58:9F:20Ethernet Broadcast10.819208802.11 Beacon
8 S F' @# [$ Z; H, I1000:19:07:58:9F:20Ethernet Broadcast11.024009802.11 Beacon
+ Z H, V: X2 ^1100:19:07:58:9F:20Ethernet Broadcast11.12641802.11 Beacon0 P. c1 C) ]- a4 \. W
1200:17:23:0D:2C:7DEthernet Broadcast11.175586802.11 Probe Req
, m7 t- g7 Q/ _, [( v; L' R, l1300:17:23:0D:2C:7DEthernet Broadcast11.208822802.11 Probe Req
! Q+ r' w, W) g1400:19:07:58:9F:20Ethernet Broadcast11.228811802.11 Beacon L1 G. z% q: n: Q( Z% M) T! v
1500:19:07:58:9F:20Ethernet Broadcast11.331212802.11 Beacon
$ {% z1 f2 `3 O; Q- k- y F2 u1600:17:23:0D:2C:7DEthernet Broadcast11.385512802.11 Probe Req2 ]2 n2 |# Z! h5 ?! h8 ?
17Ethernet Broadcast00:19:07:58:9F:2011.422788802.11 Ack
0 \% Y3 m3 i# U I$ L `1800:19:07:58:9F:20Ethernet Broadcast11.433613802.11 Beacon
. m6 X4 }/ L' p: w2 F1900:19:07:58:9F:2000:17:23:0D:2C:7D11.4586802.11 Probe Rsp. c, c( T8 v; o: ]8 u, w) @
2000:19:07:58:9F:2000:17:23:0D:2C:7D11.460278802.11 Probe Rsp
3 o$ q8 p) i7 P- |' I4 c- m. `2100:17:23:0D:2C:7D00:19:07:58:9F:2011.460593802.11 Ack) T3 Z) D$ |/ X( b c
2200:17:23:0D:2C:7D00:19:07:58:9F:2011.527452802.11 Auth. C/ E9 l* \; W! E( v. D
2300:19:07:58:9F:2000:17:23:0D:2C:7D11.527764802.11 Ack
G; D) F9 v5 m4 ~' s: z2400:19:07:58:9F:2000:17:23:0D:2C:7D111.528054802.11 Auth
2 t6 a( O! r S' O3 B( I2500:17:23:0D:2C:7D00:19:07:58:9F:2011.528362802.11 Ack2 B0 J1 F' j! s
2600:17:23:0D:2C:7D00:19:07:58:9F:2011.529416802.11 Assoc Req
% |4 E1 l* M/ B8 J2 ?# h2700:19:07:58:9F:2000:17:23:0D:2C:7D11.529731802.11 Ack
: ~2 ~: o s) _9 C$ l# F8 N2800:19:07:58:9F:2000:17:23:0D:2C:7D111.530343802.11 Assoc Rsp) y9 u# o" P2 u# ]. F& G- u
2900:17:23:0D:2C:7D00:19:07:58:9F:2011.530655802.11 Ack
2 B+ A- h2 r+ I v" t30192.168.21.54224.0.0.1111.531262IGMP
2 [1 L7 ?) b, \- F0 F, K- Q31192.168.21.54224.0.0.1111.532943IGMP' K' \4 t, N6 c6 S1 _' g
3200:17:23:0D:2C:7D00:19:07:58:9F:20111.533059802.11 Ack
7 W4 F. X/ U: O3300:19:07:58:9F:2000:17:23:0D:2C:7D111.533673WLCCP/ X% Z; W: G( b
3400:17:23:0D:2C:7D00:19:07:58:9F:20111.53379802.11 Ack2 R+ v+ x" X* x' |5 W) l7 y$ z8 V# d
3500:19:07:58:9F:20Ethernet Broadcast11.536016802.11 Beacon. \2 H3 p- p' o$ |
3600:19:07:58:9F:20Ethernet Broadcast11.638414802.11 Beacon
5 k/ w# D. }5 d' i( ~ c9 [9 e3700:19:07:58:9F:20Ethernet Broadcast11.740816802.11 Beacon- m8 U7 y+ B3 _0 `9 v v$ n3 A
3800:19:07:58:9F:20Ethernet Broadcast11.843218802.11 Beacon
3 t3 b* c% t0 h* e( s3900:19:07:58:9F:20Ethernet Broadcast11.945617802.11 Beacon
# T' o1 P7 W( _, M/ _4000:19:07:58:9F:20Ethernet Broadcast12.048018802.11 Beacon
( q0 @$ ^9 D. n6 J4100:19:07:58:9F:20Ethernet Broadcast12.150419802.11 Beacon
$ f. C8 `! a4 f0 ?42192.168.21.54224.0.0.1112.172736IGMP( v g8 J- v. I
4300:17:23:0D:2C:7D00:19:07:58:9F:20112.172852802.11 Ack
* k1 `9 n7 p/ c+ K# q4400:19:07:58:9F:20Ethernet Broadcast12.25282802.11 Beacon; ~& ~, ]/ _# b# y, }" \ |" H6 x
4500:19:07:58:9F:20Ethernet Broadcast12.355221802.11 Beacon
8 V% L* b0 X3 e. \, f1 e% ]4600:19:07:58:9F:20Ethernet Broadcast12.457622802.11 Beacon/ w! n+ B0 u& s+ o* c
5 q7 s9 I. S$ C& E" r4 o% e
! f0 s) s% h0 ^" `把一些無關痛癢的包不管,整個握手過程為包括
" J; x' C* E6 ]1 i) ]Beacon1 N% l0 a. S# q
802.11 Probe Req -> 802.11 Probe Rsp. f I; ?0 B& }3 K3 h, q' G
802.11 Auth -> 802.11 Auth
: g1 |& `9 F* x3 L802.11 Assoc Req -> 802.11 Assoc Rsp
7 v. c" S' k6 R. }1 {: @, i, y( g) j7 Z' b# Y4 l) V% u+ a2 k U0 k* J
而每當Source 傳一個包給 Destination, Destionation 都會向 source 回應 802.11 Ack,這個暫不理,那麼我們把上表簡化為下表,跟著會詳細把每個包的重點提出來。
2 Z8 p3 t3 J6 E% P* K: C' S& a2 q, {6 M/ S
& d/ o* O* w; {2 G, A/ Q, a' v* m: ?
PacketSourceDestinationData RateRelative TimeProtocol% k- W0 V, n# ]2 D, }% \
100:19:07:58:9F:20Ethernet Broadcast10802.11 Beacon! k9 s0 \$ l4 B: _" C& i; d3 r
1600:17:23:0D:2C:7DEthernet Broadcast11.385512802.11 Probe Req
% \! j+ ]% R' \" f. S0 P1 D2000:19:07:58:9F:2000:17:23:0D:2C:7D11.460278802.11 Probe Rsp
3 Y$ \4 T% [. s/ w+ [) D! }/ T2200:17:23:0D:2C:7D00:19:07:58:9F:2011.527452802.11 Auth
- h* j; ^% H/ }2400:19:07:58:9F:2000:17:23:0D:2C:7D111.528054802.11 Auth+ l; @3 N% N- V# H& E" g0 T/ [# C6 m
2600:17:23:0D:2C:7D00:19:07:58:9F:2011.529416802.11 Assoc Req6 N6 \$ T9 ^& ^5 y% d6 }+ Y: ~
2800:19:07:58:9F:2000:17:23:0D:2C:7D111.530343802.11 Assoc Rsp3 a- Q8 Q, U# j6 ?% } |