Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\client-assoc\psk-open\clientassoc_wpapsk_fail_wlan.pcapng
Messages: 23
[00001] Frame 1 — 🔍 Probe Request (0x0004)
⏱️ 2017-01-16T02:16:36.211061Z
📱 iPhone Client ➜ 📢 Broadcast
[00002] Frame 2 — 📋 Probe Response (0x0005)
⏱️ 2017-01-16T02:16:36.211075Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00003] Frame 3 — 🔐 Authentication (0x000b)
⏱️ 2017-01-16T02:16:36.220162Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00004] Frame 4 — ✅ ACK (0x001d)
⏱️ 2017-01-16T02:16:36.22017Z
📱 iPhone Client ➜ 📱 iPhone Client
[00005] Frame 5 — 🔐 Authentication (0x000b)
⏱️ 2017-01-16T02:16:36.240503Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00006] Frame 6 — 🔐 Authentication (0x000b)
⏱️ 2017-01-16T02:16:36.243174Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00007] Frame 7 — ✅ Association Response (0x0001)
⏱️ 2017-01-16T02:16:36.250773Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00008] Frame 8 — 🔐 EAPOL Key
⏱️ 2017-01-16T02:16:36.250784Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00009] Frame 9 — 📋 Action (0x000d)
⏱️ 2017-01-16T02:16:36.252451Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00010] Frame 11 — 📦 QoS Data (0x0028)
⏱️ 2017-01-16T02:16:36.252628Z
📱 iPhone Client ➜ 📱 Client AX
[00011] Frame 12 — 🔐 EAPOL Key
⏱️ 2017-01-16T02:16:36.252701Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00012] Frame 14 — 📋 Action (0x000d)
⏱️ 2017-01-16T02:16:36.252802Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00013] Frame 15 — ✅ Block Ack Req (0x0018)
⏱️ 2017-01-16T02:16:36.252943Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00014] Frame 16 — ✅ Block Ack (0x0019)
⏱️ 2017-01-16T02:16:36.252985Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00015] Frame 17 — 📡 Beacon frame (0x0008)
⏱️ 2017-01-16T02:16:36.271527Z
📡 Cisco AP 1 ➜ 📢 Broadcast
[00016] Frame 28 — 🔐 EAPOL Key
⏱️ 2017-01-16T02:16:37.390955Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00017] Frame 29 — 🔐 EAPOL Key
⏱️ 2017-01-16T02:16:37.391666Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00018] Frame 39 — 📋 Probe Response (0x0005)
⏱️ 2017-01-16T02:16:38.162914Z
📡 Cisco AP 1 ➜ 📱 Client AW
[00019] Frame 40 — 📋 Probe Response (0x0005)
⏱️ 2017-01-16T02:16:38.162991Z
📡 Cisco AP 1 ➜ 📱 Client AW
[00020] Frame 41 — 📋 Probe Response (0x0005)
⏱️ 2017-01-16T02:16:38.172293Z
📡 Cisco AP 1 ➜ 📱 Client AW
[00021] Frame 44 — 🔐 EAPOL Key
⏱️ 2017-01-16T02:16:38.390163Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00022] Frame 45 — 🔐 EAPOL Key
⏱️ 2017-01-16T02:16:38.390854Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00023] Frame 55 — 🚫 Deauthentication (0x000c)
⏱️ 2017-01-16T02:16:39.388598Z
📡 Cisco AP 1 ➜ 📱 iPhone Client