I've been read a lot about it, but I'm not 100% sure about it. The most clear response I've found is https://security.stackexchange.com/a/167845/163215
So, according to this, in this scenario:
I have a MacBook connected to a network using wifi, and with Wireshark installed and capturing in promiscuous mode. In the same Wifi network, there is a host A that is sending and receiving TCP packets with www.google.es. I do not have access neither to A nor the router.
It's impossible to see in the Wireshark session any of the packets. This is what it's happening in the test that I have done, I only can see a few UDP from the host A.
So, is all of this true? Or do I have any mechanism to see the TCP packets between host A and Google?
Another approach is capturing in monitor mode, but obviously it has an enormous amount of noise. But I have been reading that it's possible to "decrypt" 802.11 traffic with a key using the WPA key but I haven't been able to achieve it yet. What result I would obtain with this? Could be possible to filter the traffic to only packets of my network and then translate them to something with information about IP or TCP layers?