deonvdw / paradoxip-dissector

Wireshark dissector for Paradox alarm IP messages (IP150/PCS250)
4 stars 2 forks source link

Cannot decrypt payload data #1

Closed KraskoVladimir closed 1 year ago

KraskoVladimir commented 1 year ago

Hi. My goal is to capture Babyware - IP150 communication, so I found your tool with whose help I wanted to decrypt my payloads. While installing, I didn't use these steps: https://github.com/deonvdw/paradoxip-dissector#building Instead, I installed Wireshark version 3.4.2. and I only copied paradoxip.dll into plugins\3.4\epan folder: https://github.com/deonvdw/paradoxip-dissector/releases/tag/0.1.0 I was hoping that I will receive similar output as yours: screenshot

but I got the following:

Am I doing something wrong? How can I resolve these issues and got properly decrypted payloads? Thanks in advance! All the best!

deonvdw commented 1 year ago

Hi,

Your screenshot shows that the message payload could be decrypted. There are two requirements for decryption:

KraskoVladimir commented 1 year ago

Yes, when we recorder traffic once again, this time capture contained the login request and response and we got a better and more descriptive wireshark capture. Thanks!