0% found this document useful (0 votes)
18 views5 pages

TP 8

Uploaded by

Djoueiria Guerfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

TP 8

Uploaded by

Djoueiria Guerfa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

TP 8: Wireshark Lab: 802.

11
SOLUTION

Nom : Guerfa

Prénom : Djoueiria

Groupe 1

Matricule : 212136047741
Beacon Frames

1. ANSWER: The two access points that are issuing most of the beacon frames have an
SSID of “30 Munroe St” and “linsys_SES_24086”.
This filters Beacon frames. Look for the SSID field within the frames.
wlan.fc.type_subtype == 0x08

2. ANSWER: The beacon interval for both access points in reported in the Beacon
Interval of the 802.11 wireless LAN Management frame as .1024 seconds . Note that
the 30 Munroe St AP beacon frames show up in the trace at this regularity, but the
beacons from the linsys_SES_24086 AP do not.

This filter targets Beacon frames from both SSIDs. We Check the Beacon Interval field
and compare the timestamps of consecutive frames.
wlan.ssid == "30 Munroe St" || wlan.ssid == "linksys_SES_24086"

We used this filter with these questions 3, 4, 5 and 6


wlan.fc.type_subtype == 0x08 && wlan.ssid == "30 Munroe St"

3. ANSWER: The source MAC address on the 30 Munroe St, beacon frame is
00:16:b6:f7:1d:51
Look at the wlan.sa field for the source MAC address.
wlan.fc.type_subtype == 0x08 && wlan.ssid == "30 Munroe St"

4. ANSWER: The destination MAC address on the 30 Munroe St, beacon frame is
ff:ff:ff:ff:ff:ff, -> the Ethernet broadcast address.

5. ANSWER: The MAC BSS ID address on the 30 Munroe St, beacon frame is
00:16:b6:f7:1d:51
Note that this is the same as for the source address (since this is a beacon frame)

6. ANSWER:
 The support rates are 1.0, 2.0, 5.5, 11.0 Mbps.
 The extended rates are 6.0, 9.0, 12.0, 18.0, 24.0, 36.0, 48.0 and 54.0 Mbps.
Data Transfer
7. ANSWER:
- The TCP SYN is sent at t = 24.811093 seconds into the trace.
- The MAC address for the host sending the TCP SYN is 00:13:02:d1:b6:4f.
- The MAC address for the destination, which the first hop router to which the host
is connected, is 00:16:b6:f4:eb:a8.
- The MAC address for the BSS is 00:16:b6:f7:1d:51.
- The IP address of the host sending the TCP SYN is 192.168.1.109.

- That this is a NATed address. The destination address is 128.199.245.12. This


corresponds to the server gaia.cs.umass.edu. The destination MAC address of the
frame containing the SYN is different from the destination IP address of the IP
packet contained within this frame.

8. ANSWER:
- The TCP SYNACK is received at t = 24.827751 seconds into the trace.
- The MAC address for the sender of the 802.11 frame containing the TCP
SYNACK segment is 00:16:b6:f4: eb: a8, which is the first hop router to which
the host is attached.
- The MAC address for the destination, which the host itself, is 91:2a:b0:49:b6:4f.
(This is different from the MAC address of the host used in the frame that sends
the TCP SYN. The host wireless interface is behaving as if it has two interface
addresses).
- The MAC address for the BSS is 00:16:b6:f7:1d:51.
- The IP address of the server sending the TCP SYNACK is 128.199.245.12
(gaia.cs.umass.edu)
- The destination address is 192.168.1.109 (our wireless PC).

This filters frames with a TCP SYN-ACK segment encapsulated. Check for:

 wlan.sa: Sender MAC address (first-hop router).


 wlan.da: Destination MAC address (host).
 wlan.bssid: BSS MAC address.

tcp.flags.syn == 1 && tcp.flags.ack == 1 && wlan.fc.type_subtype == 0x28

9. ANSWER:
 Deauthentication: wlan.fc.type_subtype == 0x0c
 Disassociation: wlan.fc.type_subtype == 0x0a
- At t = 49.583615: a DHCP release is sent by the host to the DHCP server (whose
IP address is 192.168.1.1) in the network that the host is leaving.
- At t = 49.609617: the host sends a DEAUTHENTICATION frame (Frametype =
00 [Management], subframe type = 12[Deauthentication]). One might have
expected to see a DISASSOCIATION request to have been sent.

10. ANSWER: The first AUTHENTICATION from the host to the AP is at t =


49.638857.

11. ANSWER: The host is requesting that the association be open (by specifying
Authentication Algorithm: Open System).

12. ANSWER: I cannot find any reply from the AP. This is probably because the AP is
configured to require a key when associating with that AP, so the AP is likely ignoring
(i.e., not responding to) requests for open access.

13. ANSWER:

- At t = 63.168087: there is an AUTHENTICATION frame sent from


00:13:02:d1:b6:4f (the wireless host) to 00:16:b7:f7:1d:51 (the BSS).
- At t = 63.169071: there is an AUTHENTICATION from sent in the reverse
direction from the BSS to the wireless host.

14. ANSWER:
- At t = 63.169910: there is an ASSOCIATE REQUEST frame sent from
00:13:02:d1:b6:4f (the wireless host) to 00:16:b7:f7:1d:51 (the BSS).
- At t = 63.192101: there is an ASSOCIATE RESPONSE from sent in the reverse
direction from the BSS to the wireless host.

15. ANSWER:
- In the ASSOCIATION REQUEST frame, the supported rates are advertised as 1,
2, 5.5, 11, 6, 9, 12, 18, 24, 32, 48, and 54 Mbps.
- The same rates are advertised in the ASSOCIATION RESPONSE.

16. ANSWER:
- At t = 2.297613: there is a PROBE REQUEST sent with source
00:12:f0:1f:57:13, destination: ff:ff:ff:ff:ff:ff, and a BSSID of ff:ff:ff:ff:ff:ff.
- At t = 2.300697: there is a PROBE RESPONSE sent with source:
00:16:b6:f7:1d:51, destination and a BSSID of 00:16:b6:f7:1d:51.
 A PROBE REQUEST is used by a host in active scanning to find an Access
Point.
 A PROBE RESPONSE is sent by the access point to the host sending the request.
 Probe Request: wlan.fc.type_subtype == 0x04
 Probe Response: wlan.fc.type_subtype == 0x05;

we check the wlan.sa, wlan.da, and wlan.bssid fields.

You might also like