Posts

Showing posts from January, 2025

Understanding the 802.11 Authentication Frame

Image
As a part of 802.11 Supplicant and Authenticator handshake, A STA must perform Authentication with the Access Point. This Authentication is often confused with some sort of security handshake or user authentication, which it is completely not! So what it is in reality? Operating at the link level, these frames are fundamental components of the Open System authentication method, involving a two-message exchange process that ensures proper network access control. Authentication Message Exchange: The authentication process begins when an unauthenticated and unassociated Station, generates the first authentication frame. In this initial frame, the station includes its MAC address in both the Source Address (SA) and Transmitter Address (TA) fields, while the target BSSID is specified in the Destination Address (DA) and Receiver Address (RA) fields. Wireshark Filter : "wlan.fc.type_subtype eq 11" Access point responds with a second authentication frame. This response reverses the a...

Understanding the 802.11 Association Request and Response Frames

Image
 When your smartphone or laptop (known as a STA - Station) connects to a WiFi access point (AP), it goes through a sequence of steps. This process ensures both devices can communicate effectively and securely. After successful open Authentication Phase, the Station goes through the Association Phase Association Request The Station device sends an Association Request frame to the SSID it is interested to connect with containing following information: Capability Information: What your device can do Listen Interval: How often it will wake up to check for messages. It is measured in the units of Beacon Interval  Network Name (SSID): The WiFi network it wants to join Supported Rates: What data rates station can handle If the capabilities match those of the Access Point the STA is connecting to, the STA will become associated to the Access Point and be the part of the BSS. Following Capture shows parameters of Association Request: Association Response Upon receiving Association ...

Understanding 802.11 Pseudo Headers

Image
Pseudo headers is representation of PHY information that is displayed with the captured frames from a Protocol analyzer(Wireshark). It play a crucial role in providing detailed information about signal strength, SNR, Data rates, Channels etc. While troubleshooting an issue, this information provides a detailed information about frame transmission and reception characteristics. When looking at any Wireless Captures, you must have seen the Radiotap Header which is the most well-known example of a Pseudo Header. Lets explore some of the important fields of Radiotap header:   Header length : Duration of wireless frame is derived from the PHY Header length field. It determines how long it will take to transmit the PPDU. Timestamp : It is the current timestamp of the packet and it helps STA to synchronize its timing with the Access Point. Flags:  The flags shows different PPDU related flags such as, Preamble Type: Short/Long, Frame Check Sequence (FCS) handling, Fragmentation...

Understanding the Fundamentals of WiFi Probe Request and Response Management Frames: WLAN Discovery methods

Image
For the Wireless devices to efficiently discover and connect to available networks, there are two fundamental management frames that plays and important roles; Probe Request and Probe Response frames. Let's explore how these management frames work together to help your devices find and connect to wireless networks. What is Probe Request? Probe Requests are management frames sent by a Wireless Client device or a Station (STA) when searching for wireless networks. Think of them as your device calling out "Hello, is anyone there?" This frame serves two main purposes: Finding a specific network, you have connected in the past. Discovering all available networks in coverage area of the device. Types of Probe Requests The types of Probe Request is dictated by the length of the SSID field in the Probe Request. There are two types of Probe Requests:  Directed Probe Request Broadcast Probe Request    Directed Probe Requests: When your device is looking for a specific network, it ...