Message Trace

Source: Wireshark

Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\client_bridge\wgb\bridge_wgb_wpa2psk_wired.pcapng

Messages: 12

[00001] Frame 1 — 🔍 Probe Request (0x0004)

⏱️ 2017-02-04T15:44:25.841232Z
⚫ Null MAC ➜ 📡 Cisco AP 1
Loading packet tree...

[00002] Frame 2 — 🔒 DTLS Application Data (23)

⏱️ 2017-02-04T15:44:25.845496Z
📡 AP wired B ➜ 📡 AP wired A
Loading packet tree...

[00003] Frame 3 — 🔒 DTLS Application Data (23)

⏱️ 2017-02-04T15:44:25.845646Z
📡 AP wired A ➜ 📡 AP wired B
Loading packet tree...

[00004] Frame 6 — 🔍 Probe Request (0x0004)

⏱️ 2017-02-04T15:44:27.341227Z
⚫ Null MAC ➜ 📡 Cisco AP 1
Loading packet tree...

[00005] Frame 15 — 🔍 Probe Request (0x0004)

⏱️ 2017-02-04T15:44:28.841208Z
⚫ Null MAC ➜ 📡 Cisco AP 1
Loading packet tree...

[00006] Frame 18 — 📡 Association Request (0x0000)

⏱️ 2017-02-04T15:44:28.906806Z
📱 Client B ➜ 📡 Cisco AP 1
Loading packet tree...

[00007] Frame 19 — ✅ Association Response (0x0001)

⏱️ 2017-02-04T15:44:28.908046Z
📡 Cisco AP 1 ➜ 📱 Client B
Loading packet tree...

[00008] Frame 22 — 🔐 EAPOL Key

⏱️ 2017-02-04T15:44:28.910124Z
📡 Cisco AP 1 ➜ 📱 Client B
Loading packet tree...

[00009] Frame 23 — 🔐 EAPOL Key

⏱️ 2017-02-04T15:44:28.911331Z
📱 Client B ➜ 📡 Cisco AP 1
Loading packet tree...

[00010] Frame 24 — 🔐 EAPOL Key

⏱️ 2017-02-04T15:44:28.911748Z
📡 Cisco AP 1 ➜ 📱 Client B
Loading packet tree...

[00011] Frame 25 — 🔐 EAPOL Key

⏱️ 2017-02-04T15:44:28.912359Z
📱 Client B ➜ 📡 Cisco AP 1
Loading packet tree...

[00012] Frame 29 — 📦 Data (0x0020)

⏱️ 2017-02-04T15:44:28.923331Z
📱 Client B ➜ 📡 Cisco AP 1
Loading packet tree...