Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\misc\dot11w_pmf_wlan.pcapng
Messages: 17
[00001] Frame 1 — 📡 Beacon frame (0x0008)
⏱️ 2017-02-04T16:42:19.698143Z
📡 Cisco AP 1 ➜ 📢 Broadcast
[00002] Frame 2 — 🔐 Authentication (0x000b)
⏱️ 2017-02-04T16:42:19.710218Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00003] Frame 3 — ✅ ACK (0x001d)
⏱️ 2017-02-04T16:42:19.710223Z
📱 iPhone Client ➜ 📱 iPhone Client
[00004] Frame 4 — 🔐 Authentication (0x000b)
⏱️ 2017-02-04T16:42:19.730798Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00005] Frame 5 — 📡 Association Request (0x0000)
⏱️ 2017-02-04T16:42:19.731093Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00006] Frame 7 — ✅ Association Response (0x0001)
⏱️ 2017-02-04T16:42:19.73524Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00007] Frame 8 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:42:19.735247Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00008] Frame 9 — 📋 Action (0x000d)
⏱️ 2017-02-04T16:42:19.737738Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00009] Frame 11 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:42:19.737941Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00010] Frame 13 — 📋 Action (0x000d)
⏱️ 2017-02-04T16:42:19.737983Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00011] Frame 14 — ✅ Block Ack Req (0x0018)
⏱️ 2017-02-04T16:42:19.738175Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00012] Frame 15 — ✅ Block Ack (0x0019)
⏱️ 2017-02-04T16:42:19.738178Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00013] Frame 16 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:42:19.738762Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00014] Frame 17 — 🔐 EAPOL Key
⏱️ 2017-02-04T16:42:19.739996Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00015] Frame 20 — 🔍 Probe Request (0x0004)
⏱️ 2017-02-04T16:42:33.883192Z
📱 iPhone Client ➜ 📢 Broadcast
[00016] Frame 21 — 📋 Probe Response (0x0005)
⏱️ 2017-02-04T16:42:33.884608Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00017] Frame 22 — 📡 Disassociate
⏱️ 2017-02-04T16:42:34.638524Z
📡 Cisco AP 1 ➜ 📱 iPhone Client