![]() ![]() If you are eager to learn a bit more regarding this right now, I’ll give a brief explanation in the next paragraph if programming is not your cup of tea, just skip it.Ībout ten years ago, Microsoft introduced a new API for passive Wi-Fi packets capture on Windows, the so-called “monitor mode.” It’s always been possible to capture packets on Windows, and it’s not a problem to run, say, Wireshark or CommView (non-Wi-Fi) and watch the packets that go through your Wi-Fi card. ![]() In fact, this is a long and interesting technical topic that would require a separate blog post, which I’ll hopefully write later this year. Without that, you cannot create software for analyzing networks. There is only one little problem: you can’t use them to receive Wi-Fi packets in passive monitor mode. What’s wrong with the standard vendor-supplied drivers, you might ask? From the average user’s point of view, vendor-supplied drivers are perfectly fine. The only way to achieve this on Windows is by writing a set of your own drivers for specific chipsets. When you make software for analyzing Wi-Fi networks, such as TamoGraph Site Survey or CommView for Wi-Fi, you need a way to receive (read, capture, sniff, intercept… those are all synonyms) Wi-Fi packets being sent between nearby access points and stations. Why Do We Need Special Drivers in the First Place? Below you’ll find many photos (often referred to as “geek porn”) and technical details. Part of this job is to develop drivers for Wi-Fi adapters, and in this blog post I’ll shed some light on how our development team has been testing the products of their work, and how the testing process has evolved over these 15 years, along with the evolution of wireless standards and adapters. During the last 15 of these 20 years, we’ve been making software for Wi-Fi analysis. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |