wireshark monitor mode, decrypting capture

1

I have a network, which has 2 nodes (a phone, a MacBook) both are connected to same wireless network, I know the SSID and password for the wireless network

password: mypassword
ssid: myssid
security: WPA2 Personal

I am currently running Wireshark on MacBook with following settings:

Edit > Preference > Capture > Interfaces > Edit

default buffer size `2048MiB`
default link layer header type: 802.11
monitor mode: checked

and to decrypt traffic under

Edit > Preference > Protocols > IEEE 802.11

Reassemble fragmented 802.11 datagram packets: checked
ignore vendor specific HT elements: unchecked
call subredisetor for retransmitted 802.11 frames: checked
assume packets have FCS: unchecked
Ignore the protection bit: Yes with IV
Enable decryption: checked
decryption keys: 
     key type: wpa-pwd
     key: mypassword:myssid

I start it in capture mode: I make a http call to foobar.com from my phone, and I expected wireshark to pick it up and display in sniffed data, I don't see it there.

However, if I make same HTTP call to foobar.com from my mac, I can see it being listed.

Edit:

After that I see EAPOL handshake captured

enter image description here

but still it is not able to decrypt packets captured for that source (Lg_Electr_41), also attached protocol preference

enter image description here

edit:

adding frame and data view of a random frame where source was Lg_Electr_41 from the same session where EAPOL was captured for this source

enter image description here

edit:

attaching requested frame

enter image description here

user3833308

Posted 2015-03-01T09:27:07.470

Reputation: 113

Answers

0

You need to make sure you capture the initial EAPOL handshake, as indicated in the answer when you asked the same question on the UNIX&Linux site. Try starting a capture, turning your phone off, turning it back on again, and going to foobar.com.

user164970

Posted 2015-03-01T09:27:07.470

Reputation:

Thanks again for your help, I updated question with screenshot and more detail – user3833308 – 2015-03-01T22:32:23.470

It's decrypting them, but failing to dissect the resulting packets correctly, either because the decryption got the wrong results or the packets are somehow not laid out the way Wireshark expects. Could you show the packet details and both the "Frame" and decrypted data hex panes? – None – 2015-03-01T23:15:48.597

No, that's an 802.11 null frame, which has no data to decrypt. Try a frame such as frame 926, and open up the 802.11 and LLC layers. – None – 2015-03-02T02:29:10.213