Closed jamazi closed 6 years ago
Thanks!
Hello @ZerBea . Of course, here it is eapol_qos_4addr.pcap.gz
Great, thanks. I will add it to hcxtools, too: $ hcxpcaptool -o test.hccapx *.pcap start reading from eapol_qos_4addr.pcap
summary:
file name..............: eapol_qos_4addr.pcap
file type..............: pcap 2.4
network type...........: DLT_IEEE802_11 (105)
endianess..............: little endian
read errors............: flawless
packets inside.........: 13
skipped packets........: 0
packets with FCS.......: 0
WDS packets............: 13
Cheers
Added handling of WDS packets to hcxtools, too: $ hcxpcaptool -o test.hccapx out.cap start reading from out.cap
summary:
file name..............: out.cap
file type..............: pcapng 1.0
network type...........: DLT_IEEE802_11 (105)
endianess..............: little endian
read errors............: flawless
packets inside.........: 14
skipped packets........: 0
packets with FCS.......: 0
WDS packets............: 13
beacons................: 1
EAPOL packets..........: 13
best handshakes........: 1 (ap-less: 0)
1 handshake(s) written to test.hccapx
Again, thanks!
Would be great if you guys add also support to work with tzsp encapsulated packets, currently I'm using bittwist tool to strip cap files from tzsp like this :
bittwiste -M 1 -I input.cap -O out.cap -D 1-47
or (for wireless packets):
bittwiste -M 105 -I input.cap -O out.cap -D 1-71
Please attach a cap/pcap with DLT_TZSP header to analyze it.
Great, thanks. Analyzed them and saw that hcxtools are able to detect the first 3 header of this cap:
$ hcxpcaptool -o test.hccapx tzsp.pcap start reading from tzsp.pcap
summary:
file name..............: tzsp.pcap
file type..............: pcap 2.4
network type...........: DLT_EN10MB (1)
endianess..............: little endian
read errors............: flawless
packets inside.........: 15
skipped packets........: 0
packets with FCS.......: 0
IPv4 packets...........: 15
UDP packets............: 15
Will now start to add header 4: TZSP to hcxtools That could take one or 2 days....
First step is done: detection of TaZmen Sniffer Protocol (TZSP) $ hcxpcaptool -V *.pcap start reading from tzsp.pcap
summary:
file name..............: tzsp.pcap
file type..............: pcap 2.4
network type...........: DLT_EN10MB (1)
endianess..............: little endian
read errors............: flawless
packets inside.........: 15
skipped packets........: 0
packets with FCS.......: 0
IPv4 packets...........: 15
UDP packets............: 15
TZSP packets...........: 15
Do we need all encapsulated protocols?
Great work :+1: Currently I only see ethernet and ieee_802_11 used by mikrotik sniffer tools ..
Ok, than I'll add TZSP_ENCAP_IEEE_802_11 first. Maybe TZSP_ENCAP_IEEE_802_11_PRISM and TZSP_ENCAP_IEEE_802_11_AVS depend on the used chipset. Also a future implementation of TZSP_ENCAP_PPP and TZSP_ENCAP_ETHERNET shouldn't be a big problem, because hcxtools are able to detect and handle this packets, allready. TZSP looking very interesting for me: https://wikivisually.com/wiki/TZSP
Big thanks to Atom, that we can use this (his) thread.
During my analysis, I noticed that they use variable fields (and variable field len) in TZSP header and we must do a tagwalk through the complete header.
So that will not work on every case: ...currently I'm using bittwist tool to strip cap files from tzsp like this : bittwiste -M 1 -I input.cap -O out.cap -D 1-47 or (for wireless packets): bittwiste -M 105 -I input.cap -O out.cap -D 1-71
Done. Added full support for full support (icl. conversion to hccapx) for TaZmen Sniffer Protocol (TZSP):
$ hcxpcaptool -V tzsp.pcap start reading from tzsp.pcap
summary:
file name....................: tzsp.pcap
file type....................: pcap 2.4
network type.................: DLT_EN10MB (1)
endianess....................: little endian
read errors..................: flawless
packets inside...............: 15
skipped packets..............: 0
packets with FCS.............: 0
WDS packets..................: 15
EAPOL packets................: 15
IPv4 packets.................: 15
UDP packets..................: 15
TZSP (802.11) packets........: 15
@jamazi: Do you have a non-Qos cap file ? Unfortuanetly i haven't some examples. https://github.com/magnumripper/JohnTheRipper/issues/3282#issuecomment-400361578
this will handle packets headers that contain 4 addr properly, seen this usually in RouterOS wireless sniffed packets that contains QoS header, this is example packet :