TCN Tutorial Decoding ESP Packets in Wireshark
TCN Tutorial Decoding ESP Packets in Wireshark
All Qualcomm products mentioned herein are products of Qualcomm Technologies, Inc. and/or its subsidiaries.
Qualcomm is a trademark of Qualcomm Incorporated, registered in the United States and other countries. Other product and brand names may be trademarks or registered trademarks of
their respective owners.
This technical data may be subject to U.S. and international export, re-export, or transfer (“export”) laws. Diversion contrary to U.S. and international law is strictly prohibited.
Qualcomm Technologies, Inc.
5775 Morehouse Drive
San Diego, CA 92121
U.S.A.
© 2018 Qualcomm Technologies, Inc. and/or its subsidiaries. All rights reserved.
Contents
Overview 3
Capture Logs 4
Extract PCAP Logs from QXDM Pro Logs 6
Find Ck+Ik 7
Decode ESP Packets in Wireshark v1.6.5 9
Decode ESP Packets in Wireshark v1.8.5 10
This tutorial describes how to view IPSec-encrypted SIP messages using Wireshark.
It discusses:
• Capturing QXDM Professional™ logs
• Extracting PCAP logs from the QXDM Pro logs
• Finding the ciphering key (Ck) and integrity key (Ik) within QXDM Pro logs
• Decoding ESP packets from PCAP logs in Wireshark using the Ck+Ik
Enable UIM Application Protocol Data Unit (APDU) log messages through QXDM Pro:
1. Select Options
> Message View Configuration
> Log Packets
> Common
> [0x1098] UIM Application Protocol Data Unit
MSG User Identity Module/Medium 21:31:56.890 uimisim.c 00403 Received ISIM Authenticate command
2011 Sep 9 21:31:57.089 [10] 0x1098 RUIM Debug
RX C0 DB 08 96 05 59 36 56 0A 56 88 10 E5 24 14 98 66 F1 93 B2 A3 0E 43 4F A2 FB 16 9E 10 8D A7
F8 57 A0 2D 0A 3F C4 C9 9F 9B 76 E7 9D 43 90 00