| 
 Hello all, 
  
I have spent countless hours trying to decode my 
own traffic using WPA2 and I need some help. 
  
My WPA2-PSK passphrase is "testpass". This is what 
I enter on my router configuration and my PC. I can connect to the internet no 
problem.  
My SSID is "globul". 
  
When I sniff the traffic I see the 4 EAPOL entries. 
I can't figure out what to put in the wireshark 802.11 preference. I 
tried: 
  
wpa-pwd:testpass:globul 
  
That didn't decrypt anything. 
  
I looked at the EAPOL entries and there are so many 
keys there I don't know which one to choose to try with the wpa-psk: 
parameter. 
  
  
My wireless interface is in monitor mode and seems 
to be working since I can see the EAPOL. When I type iwconfig <interface> 
it shows a long hex key. I tried to use that one, didn't work. When I type 
iwlist <interface> wpakeys it shows another long hex key. I tried that one 
too, no luck. I went to the WPA PSK (Raw Key) Generator and tried entering my 
passphrase testpass and ssid globul, used the PSK generated, no luck 
either. 
  
I can decrypt 802.11g WEP without any problem but 
I'd like to use 802.11n and go with WPA2 now on my home network. 
  
What am I missing? 
  
Thanks for your help, 
  
Matt. 
 |