-
-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
packetcraft/add_context/tshark_decryption/ #51
Comments
If I follow this procedure, then |
Can you provide OS/tshark version? |
For sure:
|
Sorry for the delay. Decrypting does not change the underlying file. It just allows you to view the decrypted file. I'm going to keep this issue open though because I think I create a solution that will write the decrypted contents to the underlying file. |
Following tmaillart's comments. For me, following the WPA2 procedure above doesn't seem to result in the decrypted.pcap actually containing decrypted data. Just a copy of the original source pcap. So the follow-on tcp.connection.rst filter run against the decrypted.pcap file doesn't output any results for me in the way it does in the video. Presumably because the data is still encrypted. I'm find this for tshark 3.4.2, 3.2.2 and 3.5.0 on Ubuntu 20.04. Any ideas how to make this work would be appreciated. |
tshark alone only decrypts and then analyzes an encrypted pcap. For example, you could check whether an encrypted pcap has an http layer in its packets as part of this decryption and extract a data layer if it exists. tshark does not decrypt the file itself as part of this process. |
Ever since 4.0 you can do this:
and it will write a file with Raw IP encapsulation with any packets that have IPv4 or IPv6 (whether encrypted and then decrypted, or originally unencrypted.) You'll lose the Radiotap header, MAC layer, LLC layer, and any packets that don't use IP (e.g. EAPOL, ARP, etc.) Fine for most usage. |
Tshark | Decrypt Data
Tshark Decryption for Kerberos, TLS, and 802.11
https://tshark.dev/packetcraft/add_context/tshark_decryption/
The text was updated successfully, but these errors were encountered: