diff --git a/caplets/wpa_handshake.cap b/caplets/wpa_handshake.cap index b5095006..0c5bbcaa 100644 --- a/caplets/wpa_handshake.cap +++ b/caplets/wpa_handshake.cap @@ -12,7 +12,10 @@ net.sniff on # interested in otherwise the sniffer might lose packets. set wifi.recon.channel 1 +# this will enable the wifi recon +set ticker.commands clear; wifi.show wifi.recon on +ticker on # uncomment to recon clients of a specific AP given its BSSID # wifi.recon DE:AD:BE:EF:DE:AD @@ -29,3 +32,7 @@ clear # This will deauth every client for this specific access point, # you can put it as ticker.commands to have the ticker module # periodically deauth clients :D +# +# For more options `help wifi.recon`. + + diff --git a/modules/net_sniff_dot11.go b/modules/net_sniff_dot11.go new file mode 100644 index 00000000..c3231e2a --- /dev/null +++ b/modules/net_sniff_dot11.go @@ -0,0 +1,28 @@ +package modules + +import ( + "github.com/google/gopacket" + "github.com/google/gopacket/layers" +) + +func dot11Parser(radiotap *layers.RadioTap, dot11 *layers.Dot11, pkt gopacket.Packet, verbose bool) { + NewSnifferEvent( + pkt.Metadata().Timestamp, + "802.11", + "-", + "-", + SniffData{ + "Size": len(pkt.Data()), + }, + "%s %s proto=%d a1=%s a2=%s a3=%s a4=%s seqn=%d frag=%d", + dot11.Type, + dot11.Flags, + dot11.Proto, + dot11.Address1, + dot11.Address2, + dot11.Address3, + dot11.Address4, + dot11.SequenceNumber, + dot11.FragmentNumber, + ).Push() +} diff --git a/modules/net_sniff_parsers.go b/modules/net_sniff_parsers.go index f96237f5..4da791f3 100644 --- a/modules/net_sniff_parsers.go +++ b/modules/net_sniff_parsers.go @@ -86,22 +86,6 @@ func unkParser(ip *layers.IPv4, pkt gopacket.Packet, verbose bool) { } } -func dot11Parser(radiotap *layers.RadioTap, dot11 *layers.Dot11, pkt gopacket.Packet, verbose bool) { - if verbose == true { - NewSnifferEvent( - pkt.Metadata().Timestamp, - "802.11", - "-", - "-", - SniffData{ - "Size": len(pkt.Data()), - }, - "%v", - dot11, - ).Push() - } -} - func mainParser(pkt gopacket.Packet, verbose bool) bool { // simple networking sniffing mode? nlayer := pkt.NetworkLayer()