WiFi Packet Capture on Linux

Overview

NOTE: This guide assumes you have admin access to the machine you're using.

This guide demonstrates how to configure and use a WiFi radio on a Linux system to perform WiFi packet capture. It assumes you are familiar with general networking concepts and are comfortable in a Linux terminal.

If you're looking to capture only TCP/UDP and higher layer traffic for your device only, performing packet capture using the existing WiFi interface on your system will suffice. However, should you want to see MAC layer traffic, including from WiFi devices other than system used for capture, using the existing interface will not suffice.

If you want more background information on WiFi or would like to watch my talk on the subject, watching the recording may prove useful.

Definitions

Since networking and WiFi use so many acronymns and abbreviations (and I will use them in this guide), here's a list of some common terms and what they mean:

802.11 LAN Topology

Instructions

1. Double-Check Some Things Before Starting

Ensure that your radio works for your use case

This can be somewhat challenging. The easiest method is to check the supported channels output later in the guide. However, some radios have specific limitations that can be tricky to discover unless you know what to look for. When in doubt, read the kernel source (/s).

For example:

Ensure you have a backup internet connection method

You can perform packet capture offline. However, creating a monitor mode interface as this guide instructs will effectively disable any use of parent radio for other usage. I recommend connecting a backup network interface if possible (e.g. Ethernet).

Ensure that you have admin access on machine

The commands used here require sudo access.

Ensure no other programs will interfere

NOTE: If you decide to delete the existing interface later on in this guide, this step is not necessary. This step is only necessary if you intend to keep any managed network interface when doing WiFi packet capture. This is generally possible if you 'DOWN' the managed interface before using the monitor and avoid using it while performing captures.

If you opt to keep the existing wireless interface around, other system programs may get in the way of your packet capture fun. The likely culprit here is NetworkManager, which is the de-facto network configuration tool on Linux these days. There's no need to disable NetworkManager entirely. Otherwise, you may lose all network access. Instead we'll configure NetworkManager to ignore the wireless interface (and by extension the wireless radio) we're going to use.

To do so, first determine if NetworkManager is active. Next, determine if any wireless interfaces exist that use the radio you want to use for packet capture (see these sections). Finally, instruct NetworkManager to ignore the interface. The following demonstrates this process for an interface wlan0:

# Check if NetworkManager is running (it is with PID 1072)
$ pgrep NetworkManager
1072

# Show devices visible to NetworkManager (note 'wlan0')
# Shorthand is `nmcli d`
$ nmcli device show
DEVICE           TYPE      STATE        CONNECTION
wlan0            wifi      connected    wlancancan
enp2s0           ethernet  unavailable  --
lo               loopback  unmanaged    --

# Print the wireless device's properties to verify that it is desired device.
#
# Here, I know my SSID is 'wlancancan' and NetworkManager names WiFi
# connections by their SSID by default. Thus, the 'GENERAL.CONNECTION' field
# matching 'wlancancan' tells me this is the right device.
$ nmcli device show wlan0
GENERAL.DEVICE:                         wlan0
GENERAL.TYPE:                           wifi
GENERAL.HWADDR:                         xx:xx:xx:xx:xx:xx
GENERAL.MTU:                            1500
GENERAL.STATE:                          100 (connected)
GENERAL.CONNECTION:                     wlancancan
GENERAL.CON-PATH:                       /org/freedesktop/NetworkManager/ActiveConnection/1
IP4.ADDRESS[1]:                         x.x.x.x/x
IP4.GATEWAY:                            x.x.x.x
ip4.roUTE[1]:                           dst = x.x.x.x/x, nh = 0.0.0.0, mt = 600
IP4.ROUTE[2]:                           dst = 169.254.0.0/16, nh = 0.0.0.0, mt = 1000
IP4.ROUTE[3]:                           dst = 0.0.0.0/0, nh = x.x.x.x, mt = 600
IP4.DNS[1]:                             8.8.8.8
IP6.ADDRESS[1]:                         fe80::8fad:12b9:d5a8:e60b/64
IP6.GATEWAY:                            --
IP6.ROUTE[1]:                           dst = fe80::/64, nh = ::, mt = 1024

# Tell NetworkManager to stop managing the WiFi device we want to use
$ nmcli device set wlan0 managed false

If you’d like NetworkManager to explicitly ignore specific network interfaces or ignore network interfaces whose name matches a specific pattern, see this guide.

2. Install Required Packages

In this guide, we'll use iw to configure the wireless monitor interface and Wireshark to perform and analyze packet captures. These are generally not installed by default on most Linux distros, though, so install them as follows:

# Debian/Ubuntu:
sudo apt install -y iw wireshark

# Fedora/RHEL:
sudo yum install -y iw wireshark

3. Determine Radio’s PHY Name

3.1 Determine PCI bus of radio

# Here the PCI bus is '03:00.0'
#
# May need to remove the pipe to grep and manually read output.
# Not all radios will appear w/ "Network controller" prefix.
$ lspci | grep Network
03:00.0 Network controller: MEDIATEK Corp. MT7921 802.11ax PCI Express Wireless Network Adapter

3.2 Determine PHY name of radio

NOTE: You can use the list_interfaces.py script to both determine the radio PHY name/number and all interfaces created using that radio. With this information in hand, you can then skip to the Manage existing interfaces using radio section.

Find the phyX which matches the PCI bus found in the previous step:

# Here the PHY is 'phy0'.
#
# May need to remove the grep here if no output appears.
# It's possible the uppermost portion of the PCI bus is non-zero.
$ ls -d /sys/class/ieee80211/*/device/driver/* | grep 0000 | sed -E 's|^.*(phy[^/]+)/.*/|\1 |'
phy0 0000:03:00.0

4. Manage Radio's Other Interfaces

For context, some radios support virtual interfaces on Linux (i.e. you can create multiple simultaneous WiFi client or virtual AP interfaces). There are some limitations with this, though, namely all interfaces on one radio must operate on the same channel and more advanced WiFi features like OFDMA may not be supported.

Some radios, like many Intel radios (e.g. BE200), do not support virtual interfaces at all on Linux. They only permit a single STA or AP (non-virtual) per radio (limited to 2.4GHz only for APs on AX200, AX210, BE200 radios). These radios (and most others) do support simultaneous monitor and STA coexistence, but this has limitations and is generally not suggested.

With that said, ensuring that other network interfaces do not interfere with the packet capture depends on the radio you’re using. My personal suggestion is to remove all network interfaces from the radio before creating the monitor, unless required not to (i.e. 6GHz Packet Capture on Intel Radios). This simplifies things if you need debug your configuration later on.

4.1 Find all interfaces using radio

# Use sysfs directory structure to get interfaces
# Example path: `/sys/class/ieee80211/phy0/device/net/wlan0`
#
# Taken from this StackExchange answer: https://unix.stackexchange.com/a/552995
$ ls /sys/class/ieee80211/*/device/net/* -d | sed -E 's|^.*(phy[^/]+)/.*/|\1 |'
phy0 wlan0

4.2 Manage existing interfaces using radio

The step depends on whether you plan to delete any existing interfaces or not. You're likely to only have one interface which uses the radio on your system, but if you find more, repeat your chosen step for each interface using the radio.

Choose one:

  1. You want the monitor to be the only network interface using the radio.

    You only need to delete the existing interface. You will need to recreate it later if you want to reconnect to the internet using WiFi (see this section).

# Deletes the 'wlan0' interface from the radio
$ sudo iw dev wlan0 del
  1. You want to keep the existing network interface which uses the radio (coexist with the monitor interface).

    You must first ensure that no other system programs will attempt to use the existing wireless interface (see this section).

# Down the interface
# Shorthand is `ip l s down dev wlan0`
$ sudo ip link set down dev wlan0

5. Create Monitor Interface on Radio

# Creates monitor interface 'moni0' (initially in 'DOWN' state)
sudo iw phy0 interface add moni0 type monitor

6. Set Monitor Interface 'UP'

# Initially created in 'DOWN' state (as shown in output below)
# '-br' stands for brief and shortens output
$ ip -br link show dev moni0
moni0            DOWN           34:c9:3d:0e:79:64 <BROADCAST,MULTICAST>

# Set monitor interface 'UP' (no output, 0 return is success)
$ sudo ip link set up dev moni0

# Verify interface is 'UP'. Look for 'UP' and 'LOWER_UP' on right side.
# 'UNKNOWN' state is expected.
#
# 'UP' indicates interface is running. 'LOWER_UP' indicates underlying phy is up.
# For example, a non-configured but plugged in Ethernet device
# may be 'DOWN' but 'LOWER_UP'. See netdevice(7).
$ ip -br link show dev moni0
moni0            UNKNOWN        34:c9:3d:0e:79:64 <BROADCAST,MULTICAST,UP,LOWER_UP>

7. Configure Monitor Interface

NOTE: Pay close attention here as this is where it can get tricky if you’re not paying attention. Things like bands and channel widths supported by your radio, regulatory domain, and even buggy behavior/radio firmware limitations can complicate this process.

7.1 Verify that the channel you want to sniff is supported

# This command lists channels supported by your radio
#
# Output below is snipped for sake of example. The radio used
# in this example does not support 6GHz band.
#
# Typically, the bands are as follows (although depends on your radio):
#    1: 2.4GHz, 2: 5GHz, 3: 6GHz (if your radio supports 6GHz)
$ iw phy0 channels
Band 1:
        * 2412 MHz [1]
          Maximum TX power: 22.0 dBm
          Channel widths: 20MHz HT40+
          ...
Band 2:
        * 5180 MHz [36]
          Maximum TX power: 22.0 dBm
          Channel widths: 20MHz HT40+ VHT80 VHT160
          ...
        * 5260 MHz [52]
          Maximum TX power: 22.0 dBm
          No IR
          Radar detection
          Channel widths: 20MHz HT40+ VHT80 VHT160
          DFS state: usable (for 60400 sec)
          DFS CAC time: 60000 ms
          ...
        * 5340 MHz [68] (disabled)
        * 5360 MHz [72] (disabled)
        * 5380 MHz [76] (disabled)
        * 5400 MHz [80] (disabled)
        * 5420 MHz [84] (disabled)
        * 5440 MHz [88] (disabled)
        * 5460 MHz [92] (disabled)
        * 5480 MHz [96] (disabled)
          ...

7.2 Configure monitor to desired channel

NOTE: This assumes your radio supports the channel you would like to sniff. The previous step details how to check. Also, if you do not configure the channel, the monitor will default to the 2.4GHz channel 1 with 20MHz channel width.

The following methods demonstrate how to configure the monitor frequency (channel), each using a different command syntax:

  1. Using channel width (generally easier)

    You can translate this syntax directly from the iw phy X channels output. It's possible to specify 160MHz and 320MHz, but some versions of iw do not support those.

$ sudo iw dev moni0 set freq 5180 80MHz
  1. Using center frequency
# TODO: Center frequency calculation (different cases for 20,40,80,160,320 vs. 80+80 and possibly 6GHz)
$ sudo iw dev moni0 set freq 5955 80 5985

If you encounter errors, even after verifying that your radio supports the desired channel, check the kernel message buffer (sudo dmesg).

I find it useful to watch the error output as it happens. To do so, use two terminals. In one, run sudo dmesg -w (-w lets you follow the output, similar to tail -f). In the other, run the iw command you’re using to configure the channel.

The following is an example error output for a radio which does not support 160MHz channels:

$ sudo iw dev moni0 set freq 5180 160MHz
kernel reports: (extension) channel is disabled
command failed: Invalid argument (-22)

7.3 Verify monitor is on desired channel

# Assuming command to set channel succeeded ('iw dev moni0 set freq ...'),
# you should see desired channel and channel width output here
$ iw dev moni0 info
Interface moni0
        ifindex 17
        wdev 0x2
        addr 00:0a:52:06:3c:b4
        type monitor
        wiphy 0
        channel 140 (5700 MHz), width: 80 MHz, center1: 5690 MHz
        txpower 24.00 dBm

8. Run Wireshark Using Monitor

NOTE: Don't forget about your packet capture if it's running. It will eat up your disk space if you let it!

Open Wireshark with admin permissions (e.g. sudo wireshark) and select the created interface ('moni0' in the example below), then press ‘Enter’ to begin packet capture. If you know the interface you want to sniff on, then you can use the -i option, e.g. sudo wireshark -i moni0.

For on-the-fly analysis, editing a live or recently-stopped capture in Wireshark is sufficient. However, for longer running packet captures (or if you really don't wanna redo your capture), save the capture before analyzing or use a non-GUI CLI tool like tshark (generally a separate package to install) instead.

For more a quick-reference WiFi (802.11) Wireshark filter cheatsheet, see this PDF.

Selecting wireless interface to perform packet capture on

Packet capture in progress using interface 'moni0'

9. Decrypting WPA-Personal & WPA2-Personal Wireless Traffic

When attempting to capture network traffic to/from an access point (AP) that uses "open" authentication (i.e. no encryption), no extra configuration is necessary. Everything is plaintext and painfully insecure. Wireshark just decodes the data as you'd expect. However, for APs which use encryption, you need to perform some extra steps.

If you know the password for the AP, it is straightforward to configure Wireshark to decrypt the data. To do so, configure the credential for the AP in Wireshark (e.g. password and SSID) and capture the initial connection between the STA and the AP, specifically the 4-way handshake. In the WiFi world, the initial connection is known as 'association'. To verify you have captured the 4-way handshake, filter for eapol or eapol.type == 3. You should see something similar to the following (source and destination MAC addresses removed):

Image of Wireshark capture showing a 4-way handshake

For WPA3-Personal, Wireshark can decrypt traffic. However, the process has limitations and is more involved to configure due to the nature of WPA3-Personal authentication (oh darn, it's more secure! /s). The main limitation when decrypting WPA3-Personal is the traffic you can decrypt with one Wireshark-configured key is limited to traffic transmitted between a single STA and AP, and that's assuming you can easily get the key. This limitation contrasts with WPA-Personal and WPA2-Personal where knowing the credentials is enough to decrypt any traffic transmitted to/received from that AP. It is unclear if Wireshark can decrypt OWE (so-called 'Enhanced Open') authentication.

See the HowToDecrypt802.11 guide on Wireshark's Wiki for more information.

Resetting Your WiFi

Okay you had your fun, now time to use your WiFi again. You can either reboot (most systems simply recreate a default managed interface on reboot) or run the following commands:

# Delete monitor interface
#
# NetworkManager will deal w/ configuring connection to your WiFi
$ sudo iw dev moni0 del

# Recreate virtual interface we previously deleted
#
# 'managed' is type STA
$ sudo iw phy0 interface add wlan0 type managed

# Tell NetworkManager to configure your radio (might do this by default, but just in case)
#
# This may happen automatically, but good to run just in case
$ nmcli device set wlan0 managed true

6GHz Packet Capture with Intel Radios

NOTE: I have only tested this with AX210 and BE200 radios operating in a US wireless regulatory domain.

NOTE: This assumes that you have determined the radio's phy name and know how to find all interfaces using the radio.

The AX210 and BE200 radios are WiFi 6E and WiFi 7 radios, respectively (unlike the AX200 which is WiFi 6). For context, WiFi 6E is the first generation of WiFi which supports the new 6GHz band. While both radios can only operate as an AP in the 2.4GHz band on Linux, both can operate as both a STA and monitor on 2.4GHz, 5GHz, and 6GHz bands. To use a monitor in the 6GHz band, though, you need to follow a couple steps first.

To configure a 6GHz Intel radio monitor, the radio firmware must first detect that it is in the US wireless regulatory domain. Then, after detection, you can create a monitor on the 6GHz channels that the radio supports. To do so, perform the following steps.

1. Delete All Other Interfaces Using Radio

Delete all network interfaces using the radio by following the instructions which run iw dev ... del in this section.

2. Create and Up a Station on Radio

# Create interface 'wlan0' on radio ('managed' is type STA)
$ sudo iw phy0 interface add wlan0 type managed

# Admin 'UP' the station, so you can use it
# '-br' stands for brief and shortens output
$ sudo ip -br link set dev wlan0 up

# OPTIONAL
# Show channels permitted for use on radio
$ iw phy0 channels

3. Run a Scan on Station

# Admin 'UP' the station, so you can use it
$ sudo iw dev wlan0 scan

4. Create Monitor Interface on Radio

# Creates monitor interface 'moni0' (initially in 'DOWN' state)
sudo iw phy0 interface add moni0 type monitor

# 'UP' monitor interface, so you can use it
$ sudo ip -br link set dev moni0 up

5. Down Station

NOTE: Do not delete the STA interface, only 'DOWN' it. You must keep it in order to scan 6GHz.

It is critical that this step comes after creating and 'UP'ing the monitor interface. Otherwise, you will be unable to configure the Intel radio monitor for 6GHz channels.

# Admin 'DOWN' the station. Does not delete it.
# '-br' stands for brief and shortens output
$ sudo ip -br link set dev wlan0 down

6. Verify 6GHz Channels Enabled

NOTE: You may see output which only list 20MHz supported channel widths. You should be able to configure other channel widths (40MHz, 80MHz, 160MHz). However, it may take some trial and error. Your best bet is to reference the 6GHz supported channels. Primary scanning channels (PSC) have worked well in my experience.

Look for any 6GHz channels in the output of this command (should be at the end). If you see them, then you can configure the monitor on 6GHz channels. If you jumped here from earlier in the guide, jump to the configure monitor interface step and proceed.

# Prints out enabled channels on radio
$ iw phy0 channels

References

NOTE: The behavior of iwconfig and ifconfig has been superceded by NetworkManager on most Linux systems. Some of the following references use it instead.