Message Trace

Source: Wireshark

Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\client-assoc\psk-open\clientassoc_wpapsk_fail_wlan.pcapng

Messages: 23

[00001] Frame 1 — 🔍 Probe Request (0x0004)

⏱️ 2017-01-16T02:16:36.211061Z
📱 iPhone Client ➜ 📢 Broadcast
Loading packet tree...

[00002] Frame 2 — 📋 Probe Response (0x0005)

⏱️ 2017-01-16T02:16:36.211075Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00003] Frame 3 — 🔐 Authentication (0x000b)

⏱️ 2017-01-16T02:16:36.220162Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00004] Frame 4 — ✅ ACK (0x001d)

⏱️ 2017-01-16T02:16:36.22017Z
📱 iPhone Client ➜ 📱 iPhone Client
Loading packet tree...

[00005] Frame 5 — 🔐 Authentication (0x000b)

⏱️ 2017-01-16T02:16:36.240503Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00006] Frame 6 — 🔐 Authentication (0x000b)

⏱️ 2017-01-16T02:16:36.243174Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00007] Frame 7 — ✅ Association Response (0x0001)

⏱️ 2017-01-16T02:16:36.250773Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00008] Frame 8 — 🔐 EAPOL Key

⏱️ 2017-01-16T02:16:36.250784Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00009] Frame 9 — 📋 Action (0x000d)

⏱️ 2017-01-16T02:16:36.252451Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00010] Frame 11 — 📦 QoS Data (0x0028)

⏱️ 2017-01-16T02:16:36.252628Z
📱 iPhone Client ➜ 📱 Client AX
Loading packet tree...

[00011] Frame 12 — 🔐 EAPOL Key

⏱️ 2017-01-16T02:16:36.252701Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00012] Frame 14 — 📋 Action (0x000d)

⏱️ 2017-01-16T02:16:36.252802Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00013] Frame 15 — ✅ Block Ack Req (0x0018)

⏱️ 2017-01-16T02:16:36.252943Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00014] Frame 16 — ✅ Block Ack (0x0019)

⏱️ 2017-01-16T02:16:36.252985Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00015] Frame 17 — 📡 Beacon frame (0x0008)

⏱️ 2017-01-16T02:16:36.271527Z
📡 Cisco AP 1 ➜ 📢 Broadcast
Loading packet tree...

[00016] Frame 28 — 🔐 EAPOL Key

⏱️ 2017-01-16T02:16:37.390955Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00017] Frame 29 — 🔐 EAPOL Key

⏱️ 2017-01-16T02:16:37.391666Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00018] Frame 39 — 📋 Probe Response (0x0005)

⏱️ 2017-01-16T02:16:38.162914Z
📡 Cisco AP 1 ➜ 📱 Client AW
Loading packet tree...

[00019] Frame 40 — 📋 Probe Response (0x0005)

⏱️ 2017-01-16T02:16:38.162991Z
📡 Cisco AP 1 ➜ 📱 Client AW
Loading packet tree...

[00020] Frame 41 — 📋 Probe Response (0x0005)

⏱️ 2017-01-16T02:16:38.172293Z
📡 Cisco AP 1 ➜ 📱 Client AW
Loading packet tree...

[00021] Frame 44 — 🔐 EAPOL Key

⏱️ 2017-01-16T02:16:38.390163Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00022] Frame 45 — 🔐 EAPOL Key

⏱️ 2017-01-16T02:16:38.390854Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00023] Frame 55 — 🚫 Deauthentication (0x000c)

⏱️ 2017-01-16T02:16:39.388598Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...