Skip to Main Content
Wireshark 2 Quick Start Guide
book

Wireshark 2 Quick Start Guide

by Charit Mishra
June 2018
Beginner content levelBeginner
164 pages
3h 31m
English
Packt Publishing
Content preview from Wireshark 2 Quick Start Guide

Usual and unusual wireless traffic

In 2003, Wi-Fi Protected Access (WPA) was launched by Wi-Fi Alliance as a measure to make WLAN communication stronger than the previous protocol, WEP. The key size used by WEP is 40/104 bits, whereas WPA uses a key size of 256 bits and also facilitates integrity checks. In WEP, the traditional CRC was implemented, but WPA introduced, the popular Michael 64-bit Message integrity check (MIC).

WPA uses the RC4 algorithm to build a session based on dynamic encryption keys (you would never end up using the same key pair between two hosts). Refer to the following illustration of how the cipher text is formed that is transmitted over the medium:

The process starts by appending the IV and the dynamically generated ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireshark Fundamentals

Wireshark Fundamentals

Jerome Henry / James Garringer
Firewall Fundamentals

Firewall Fundamentals

Wes Noonan, Ido Dubrawsky
Network Analysis Using Wireshark 2 Cookbook - Second Edition

Network Analysis Using Wireshark 2 Cookbook - Second Edition

Nagendra Kumar Nainar, Yoram Orzach, Yogesh Ramdoss

Publisher Resources

ISBN: 9781789342789OtherErrata PagePurchase Link