![wifi packet structure wifi packet structure](https://mrncciew.files.wordpress.com/2013/03/802-11-frames-01.png)
The major difference between the two networking platforms is found at the lower layers of the OSI model. Wireless networks still use TCP/IP for data communication and abide by all of the same laws of networking as wired hosts. Once the right data is being collected I will discuss different analysis techniques including analyzing WEP/WPA authentication, filtering for encrypted traffic, and finding rogue access points.Īt the packet level wireless networks are similar to wired networks in most ways. I will start by demonstrating methods for actually collecting wireless network packets properly. In this article I am going to discuss useful techniques for troubleshooting wireless security issues at the packet level. That being said, securing wireless networks will continue to be a challenge for the foreseeable future.
![wifi packet structure wifi packet structure](https://www.mathworks.com/help/wlan/gs/wlan_ppdu_format.png)
In a wireless network, establishing connectivity isn’t as simple as plugging in a cable, physical security isn’t nearly as easy as just keeping unauthorized individuals out of a facility, and troubleshooting even trivial issues can sometimes result in a few expletives being thrown in the general direction of an access point. The tricky thing about a wireless network is that you can’t always see what you are dealing with.