1 | initial version |
Some other tools for decryption of wireless traffic:
https://www.aircrack-ng.org/doku.php?id=airdecap-ng https://www.savvius.com/product/omnipeek/ https://github.com/mfontanini/dot11decrypt https://www.tamos.com/products/commwifi/ tshark (not sure how much this helps, if the ultimate problem is how Wireshark is handling the issue)
Make sure all your frames are valid, i.e. just because you see that you have all four EAPOL frames, does not mean that the FCS is good for each of them.
You could also post a sample trace that is showing the issue and others could attempt the process.
2 | No.2 Revision |
Some other tools for decryption of wireless traffic:
https://www.aircrack-ng.org/doku.php?id=airdecap-ng
https://www.savvius.com/product/omnipeek/
https://github.com/mfontanini/dot11decrypt
https://www.tamos.com/products/commwifi/
tshark (not sure how much this helps, if the ultimate problem is how Wireshark is handling the issue)https://www.tamos.com/products/commwifi/
Make sure all your frames are valid, i.e. just because you see that you have all four EAPOL frames, does not mean that the FCS is good for each of them.
You could also post a sample trace that is showing the issue and others could attempt the process.
3 | No.3 Revision |
Some other tools for decryption of wireless traffic:
https://www.aircrack-ng.org/doku.php?id=airdecap-ng https://www.savvius.com/product/omnipeek/ https://github.com/mfontanini/dot11decrypt
Make sure all your frames are valid, i.e. just because you see that you have all four EAPOL frames, does not mean that the FCS is good for each of them.
You could also post a sample trace that is showing the issue and others could attempt the process.