

- #Wireshark promiscuous mode mac drivers#
- #Wireshark promiscuous mode mac driver#
- #Wireshark promiscuous mode mac mac#
On a practical note: use iw phy to list your wiphys, iw dev to list the vif associated with the wiphys, use iw phy phyX interface add mon0 type monitor to create a mon0 monitor vif associated with the phyX wiphy. When this combination is supported, the monitor vif will automatically be slaved to whatever channel the managed vif is using, so you don't even have to configure the monitor channel or anything, and even if you try, it will most likely fail. This multi-vif configuration is supported by all mac80211 based softMAC drivers, but there is still the possibility that it is not supported by some fullMAC devices, even if they support a single monitor vif. For that you need two vifs: a managed station vif and a monitor vif. Now what you ask is a way to both act as a station AND receive frames from other stations.
#Wireshark promiscuous mode mac driver#
When the driver doesn't, it generally because the card is a fullMAC wifi interface that does not provide the functionality.
#Wireshark promiscuous mode mac drivers#
Most Linux drivers support monitor mode vifs. Generally, these interface allow to receive frames for other stations associated to the same AP, but also frames that belong to other BSSes (depending on the monitor options). This is a 802.11-with-radiotap network interface that receives as much 802.11 frames as the wifi card can provide to the kernel/driver. There is usually one vif per wiphy, but additional vifs may be created if supported by the driver and card. These vifs are the part that actually assumes wifi modes (managed station, AP, IBSS station, mesh point). This wiphy is in fact a container of virtual network interfaces, known as "vif"s. On modern Linux system and cfg80211-based drivers, the 802.11 network card is presented as a "wiphy", which is not a network interface nor allow you to capture frames. Depending on the OS, this is either presented as a different API or as a true 802.11 network interface. What you actually need is an interface that can fetch true 802.11 frames. And remember that receiving frames for other stations is unreliable, because the AP will retransmit these frames until the other station received it correctly, not until you receive it correctly. And 802.11 has support for AP that both allow encryption and clear text, so you cannot even enable that feature when connected to a open access point. More importantly: Even if promiscuous mode on that interface is meant to enable receiving frames for other stations, these frames can not be presented as Ethernet frames: A 802.11 frame has 3 or 4 addresses, can have their payload encrypted and has many other fields that Ethernet does not have. On an switched Ethernet network, turning on promiscuous mode will not allow you to receive Ethernet frames that are not for you (it will merely enable you to see multicast frames that you are not interested in), so the 802.11-as-ethernet interface should do just the same thing. This means that this "promiscuous" flag is only enabled on an Ethernet-like network interface. You can already guess what you would see when capturing in promiscuous mode on a 802.11 managed interface: you get Ethernet frames that bear little resemblance with the actual 802.11 frames that got transmitted/received.

The implication is that, on most OS, a 802.11 station is presented as an Ethernet interface, which carries Ethernet frames.

The only exception being broadcast/multicast frames, which, guess what, are unreliable. This means that a station can only reliably receive frames that are for him. This has many implications on how the protocol (including security) works. All stations only have a channel to the switch, and nothing else. This means the AP essentially acts as a wireless switch. The AP will then retransmit (or not) the packet to the destination station, changing only the transceiver and receiver address.
#Wireshark promiscuous mode mac mac#
This is implemented as follows: if a station wants to communicate with another station, it must send a packet to the AP with the transceiver and source address set to its MAC address, the receiver address set to the AP's MAC address (known as the BSSID) and the destination address set to the intended station's MAC. The 802.11 ESS operation assumes that, in a BSS, all non-AP stations must send all their packets to the AP, regardless of the destination address.In Infrastructure/ESS mode, it doesn't make much sense to capture packets going to other stations in promiscuous mode, for several reasons :
