decoding EAPOL Message 3 WPA Key Data
Hello,
I have 802.11 EAPOL 4 way handshake capture and am trying to decode M3 message WPA Key Data. But Wireshark only shows it as raw data(hex dump) as truncated instead of decoding it as for example vendor specific tagged field like KDE field.
Example image can be found in below link https://www.dropbox.com/scl/fi/rufk6p...
My question is how can I decode this M3 WPA Key data correctly like for example as various KDE fields( Mac Address KDE, MLO GTK KDE, MLO Link KDE etc.)
Much appreciate help