On 2009-11-11, Tom Smith <[email protected]> wrote:
> On Wed, Nov 11, 2009 at 3:35 PM, Nick Guenther <[email protected]> wrote:
>
>
>> Well if you were using monitor mode on some other card I would say
>> it's because as a 'security measure' the firmware is blocking it, but
>> it's a Ralink and they're the open ones so hmm. Sorry, I think I'm
>> spent.
>
>
> I figured it out. The commands I posted *do* capture the 802.11 traffic
> that I'm looking for. I just did not realize that until I loaded the output
> from tcpdump into a better analyzer. While tcpdump does a fine job capturing
> packets, it's not the best analysis tool.

For many things, it is. For one, it actually runs the dissectors in
a jail, so it's reasonably safe to use on untrusted traffic.

What in particular are you missing from the 802.11 dissector?

Reply via email to