Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\client-assoc\psk-open\clientassoc_open_wlan.pcapng
Messages: 10
[00001] Frame 1 — 🔍 Probe Request (0x0004)
⏱️ 2017-01-16T01:49:20.801714Z
📱 iPhone Client ➜ 📢 Broadcast
[00002] Frame 2 — 📋 Probe Response (0x0005)
⏱️ 2017-01-16T01:49:20.807822Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00003] Frame 3 — 🔐 Authentication (0x000b)
⏱️ 2017-01-16T01:49:20.818021Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00004] Frame 4 — ✅ ACK (0x001d)
⏱️ 2017-01-16T01:49:20.818028Z
📱 iPhone Client ➜ 📱 iPhone Client
[00005] Frame 5 — 📡 Beacon frame (0x0008)
⏱️ 2017-01-16T01:49:20.84424Z
📡 Cisco AP 1 ➜ 📢 Broadcast
[00006] Frame 6 — 🔐 Authentication (0x000b)
⏱️ 2017-01-16T01:49:20.845277Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00007] Frame 7 — 📡 Association Request (0x0000)
⏱️ 2017-01-16T01:49:20.848379Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00008] Frame 9 — ✅ Association Response (0x0001)
⏱️ 2017-01-16T01:49:20.851061Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00009] Frame 10 — 💤 Null function (No data) (0x0024)
⏱️ 2017-01-16T01:49:20.869483Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00010] Frame 13 — 📋 Action (0x000d)
⏱️ 2017-01-16T01:49:21.024151Z
📱 iPhone Client ➜ 📡 Cisco AP 1