Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\client_bridge\wgb\bridge_wgb_wpa2psk_wlan.pcapng
Messages: 15
[00001] Frame 1 — 📋 Probe Response (0x0005)
⏱️ 2017-02-04T15:44:29.131945Z
📡 Cisco AP 1 ➜ 📱 Client B
[00002] Frame 2 — 📡 Beacon frame (0x0008)
⏱️ 2017-02-04T15:44:29.201223Z
📡 Cisco AP 1 ➜ 📢 Broadcast
[00003] Frame 4 — 🔐 Authentication (0x000b)
⏱️ 2017-02-04T15:44:29.310627Z
📱 Client B ➜ 📡 Cisco AP 1
[00004] Frame 5 — ✅ ACK (0x001d)
⏱️ 2017-02-04T15:44:29.310682Z
📱 Client B ➜ 📱 Client B
[00005] Frame 6 — 🔐 Authentication (0x000b)
⏱️ 2017-02-04T15:44:29.31103Z
📡 Cisco AP 1 ➜ 📱 Client B
[00006] Frame 7 — 📡 Association Request (0x0000)
⏱️ 2017-02-04T15:44:29.31117Z
📱 Client B ➜ 📡 Cisco AP 1
[00007] Frame 9 — ✅ Association Response (0x0001)
⏱️ 2017-02-04T15:44:29.313798Z
📡 Cisco AP 1 ➜ 📱 Client B
[00008] Frame 10 — 🔐 EAPOL Key
⏱️ 2017-02-04T15:44:29.315349Z
📡 Cisco AP 1 ➜ 📱 Client B
[00009] Frame 11 — 🔐 EAPOL Key
⏱️ 2017-02-04T15:44:29.315425Z
📡 Cisco AP 1 ➜ 📱 Client B
[00010] Frame 12 — 🔐 EAPOL Key
⏱️ 2017-02-04T15:44:29.315828Z
📱 Client B ➜ 📡 Cisco AP 1
[00011] Frame 14 — 🔐 EAPOL Key
⏱️ 2017-02-04T15:44:29.316008Z
📱 Client B ➜ 📡 Cisco AP 1
[00012] Frame 16 — 🔐 EAPOL Key
⏱️ 2017-02-04T15:44:29.316599Z
📡 Cisco AP 1 ➜ 📱 Client B
[00013] Frame 17 — 🔐 EAPOL Key
⏱️ 2017-02-04T15:44:29.316941Z
📱 Client B ➜ 📡 Cisco AP 1
[00014] Frame 19 — 🔐 EAPOL Key
⏱️ 2017-02-04T15:44:29.317142Z
📱 Client B ➜ 📡 Cisco AP 1
[00015] Frame 21 — 📦 QoS Data (0x0028)
⏱️ 2017-02-04T15:44:29.32789Z
📱 Client B ➜ 📡 Cisco AP 1