Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\misc\ccx_mfp_wlan.pcapng
Messages: 18
[00001] Frame 1 — 🔍 Probe Request (0x0004)
⏱️ 2017-02-04T16:48:28.942073Z
📱 Client A ➜ 📢 Broadcast
[00002] Frame 2 — 📋 Probe Response (0x0005)
⏱️ 2017-02-04T16:48:28.942123Z
📡 Cisco AP 1 ➜ 📱 Client A
[00003] Frame 3 — 🔐 Authentication (0x000b)
⏱️ 2017-02-04T16:48:29.138683Z
📱 Client A ➜ 📡 Cisco AP 1
[00004] Frame 4 — ✅ ACK (0x001d)
⏱️ 2017-02-04T16:48:29.138734Z
📱 Client A ➜ 📱 Client A
[00005] Frame 5 — 🔐 Authentication (0x000b)
⏱️ 2017-02-04T16:48:29.138998Z
📱 Client A ➜ 📡 Cisco AP 1
[00006] Frame 7 — 🔐 Authentication (0x000b)
⏱️ 2017-02-04T16:48:29.139441Z
📡 Cisco AP 1 ➜ 📱 Client A
[00007] Frame 8 — 📡 Association Request (0x0000)
⏱️ 2017-02-04T16:48:29.139688Z
📱 Client A ➜ 📡 Cisco AP 1
[00008] Frame 10 — ✅ Association Response (0x0001)
⏱️ 2017-02-04T16:48:29.142497Z
📡 Cisco AP 1 ➜ 📱 Client A
[00009] Frame 11 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:48:29.143742Z
📡 Cisco AP 1 ➜ 📱 Client A
[00010] Frame 12 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:48:29.14807Z
📱 Client A ➜ 📡 Cisco AP 1
[00011] Frame 14 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:48:29.148134Z
📱 Client A ➜ 📡 Cisco AP 1
[00012] Frame 16 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:48:29.148555Z
📱 Client A ➜ 📡 Cisco AP 1
[00013] Frame 18 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:48:29.148636Z
📱 Client A ➜ 📡 Cisco AP 1
[00014] Frame 20 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:48:29.148845Z
📡 Cisco AP 1 ➜ 📱 Client A
[00015] Frame 21 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:48:29.152682Z
📱 Client A ➜ 📡 Cisco AP 1
[00016] Frame 23 — 📡 Beacon frame (0x0008)
⏱️ 2017-02-04T16:48:29.235465Z
📡 Cisco AP 1 ➜ 📢 Broadcast
[00017] Frame 24 — 📦 QoS Data (0x0028)
⏱️ 2017-02-04T16:48:50.854744Z
📱 Client A ➜ 📡 Cisco AP 1
[00018] Frame 32 — 📡 Disassociate
⏱️ 2017-02-04T16:48:51.209789Z
📡 Cisco AP 1 ➜ 📱 Client A