Wireshark at a Glance

Wireshark (formerly Ethereal) is a free and open source packet sniffer and network traffic analyzer with good support for decoding raw 802.11 traffic. Wireshark runs on all popular operating systems, but its ability to capture wireless traffic is limited by operating system support. At the time of this writing, wireless capture is limited to popular open source operating systems and with a small number of cards on Windows using WinPcap. Decoding and analyzing 802.11 traffic is not the primary function of Wireshark, but its ability to decode protocols deep within wireless packets adds richness to traffic analysis that cannot be found in any of the other tools discussed here. The drawback is that to get a full analysis of the traffic, Wireshark requires a stronger understanding of the underlying protocols from the user.

This section is only about the 802.11-specific features of Wireshark, the interface of which is shown in Figure 5-8. For a more complete discussion of all of Wireshark's other uses, see Ethereal/Wireshark.

The Wireshark interface

Figure 5-8. The Wireshark interface

Before you can use Wireshark to capture wireless traffic, you need to enable rfmon mode for your card. If you do not, it will only show you traffic on a network that you are associated with, and will do so as though the traffic was from an Ethernet network and not 802.11. This is because in the early days of 802.11, before operating systems had native support for it, driver developers implemented an 802.11 to Ethernet translation to fool the operating system into supporting the protocol.

The procedure required to enable rfmon mode is different for every operating system and sometimes for each wireless card. Here are the most common ways to make it work on the most common systems.