WiFi Frame Analysis:
• Management Frames - Beacon, Probe, Association
• Control Frames - RTS, CTS, ACK
• Data Frames - Actual data transmission
• Each frame contains MAC addresses, timestamps, signal strength
Wireless Traffic Capture
Capture Requirements:
- Monitor Mode: Wireless adapter in promiscuous mode
- Channel Hopping: Scan across all available channels
- Antenna Positioning: Optimal signal reception placement
- Multiple Adapters: Simultaneous multi-channel capture
- Timing Synchronization: Accurate timestamp correlation
Hardware Requirements
- Compatible wireless adapters
- External antennas
- RF spectrum analyzers
- Portable capture systems
Software Tools
- Wireshark for packet analysis
- Kismet for network detection
- Aircrack-ng suite
- CommView for WiFi
Wireless Security Analysis
Security Protocol Analysis: Examining wireless security implementations to identify vulnerabilities and security breaches.
WEP Analysis:
- IV Collection: Gather initialization vectors
- Statistical Attack: FMS and PTW attacks
- Key Recovery: Extract WEP keys from captured data
- Decryption: Decrypt captured WEP traffic
WPA/WPA2 Analysis:
- 4-Way Handshake: Capture authentication handshake
- Dictionary Attack: Brute force pre-shared keys
- PMK Recovery: Extract pairwise master keys
- TKIP/CCMP Analysis: Examine encryption protocols
Rogue Access Point Detection
Detection Methods:
- SSID Monitoring: Identify unknown network names
- MAC Address Analysis: Track unauthorized devices
- Signal Strength Mapping: Locate physical device positions
- Beacon Frame Analysis: Examine broadcast patterns
- OUI Lookup: Vendor identification through MAC prefixes