Open poser opened 10 years ago
Isn't that a feature?
I don't think so. Not until we implement multi-network WPA-keys and a long-running tshark command of some sort. As is, we capture those eapol packets, sure, but we'll never be able to decrypt that traffic, because, even if we then switch over to sniffing that WiFi network (which is currently the only way we can give the app the appropriate WPA password), we'll be doing so with a new tshark command, which means we'll have lost the eapol packets.
When seeing eapol traffic on a nearby WiFi network (on the same channel or, in this case, a neighboring channel), the corresponding device padlock turns green, even though I have never specifically targeted this network.