We often get requests from users of Google’s Chrome OS, the operating system installed on the Chromebook series of portable computers, on how to troubleshoot Wifi, apps, or websites. CloudShark is particularly helpful in these cases because installing Wireshark can be difficult or out of the expertise of those using systems like Chrome OS, particularly in education where Chrome OS has become very popular.
Packet capture in Chrome OS Luckily there are a few ways you can get a network capture in Chrome OS.
Watch our in-depth video
If you deploy Aerohive devices in your network, solving problems using network captures will get it done faster. Aerohive’s integration with CloudShark makes it easy to actually work with real network traces. Watch our in-depth seminar above on how to solve a real-world problem using HiveManger NG and CloudShark.
If you’re brand new, you can read the basics of how to set up your Aerohive system with CloudShark.
Troubleshooting wireless problems often requires a deep dive down to the packet level. But with so much information in there, how do you know where to look first?
CloudShark’s new Wireless profile preset helps set up your view to give you the summary columns you need. It’s a quick and easy way to get the most information about your network traffic.
It all starts with the right profile Building on our own analysis experience, CloudShark has created a default profile for looking at 802.
When an wireless access point wants to advertise its available networks, it sends out 802.11 beacon frames. These frames are seen by other 802.11 receiving radios, and if you can capture those frames, you can use CloudShark’s Wireless Networks tool to see all of the wireless networks (named with their SSIDs) nearby.
Alternatively, when Wifi stations come online, they may send out a frame called a “Probe Request”. An access point can respond to these requests with a “Probe Response”.
Ever since the folks at Aerohive decided to integrate HiveManger NG with CloudShark, we’ve been excited to play around see what exactly we can learn from looking at packet captures from wireless networks. So, naturally, our CloudShark dev and support guru Tom was happy to jump on it when we got some of their Access Points here at CloudShark.
Our network is a bit tricky, since our sister product CDRouter is busy testing all sorts of broadband routers and wireless APs with their networks on, so he brought it out of the noise and tested it at home for a night.
Today’s Wireless Access Points have multiple radio interfaces (for the 2.4 GHz and 5 GHz ranges) that can both host Wifi clients. What if you want to see capture data from both? Aerohive’s HiveManagerNG lets you capture on both of these interfaces at the same time. This makes two different captures, but with CloudShark’s Merge feature you can put them together and view all of the packets going through your AP at once.
Now that we have our new Aerohive APs in our office, we’ve been excited to learn more about wireless troubleshooting and debugging. The built-in packet capture feature in HiveManager NG makes getting traces into CloudShark for analysis really easy. Now that we have the traces, what do we do with them?
We wanted to put together a list of some of the resources that have helped us get started learning about the 802.
By now you’ve signed up for a CloudShark account and probably pushed your first capture from HiveManager NG into your repository. Where do you go from here? What sort of things should you be looking for?
What exactly have I captured? A packet capture file sourced from your Aerohive device contains a record of all network traffic that passed through the interface you chose when doing your capture. In HiveManager NG, if you have captured on a WLAN interface, this will be 802.
Watch the video. Sometimes when analyzing problems in Wifi networks you need to go straight to the packets. What tools are there to do Wifi capture? What should you look for in your packets?
Watch one of our premier integrators, Airtool’s Adrian Granados, as he shows you:
Installing and configuring the Airtool wireless tool for OSX Capturing and uploading to CloudShark Wifi packet analysis tools in CloudShark And more!
Watch the video. We absolutely love the community that CloudShark and the CloudShark API has created. Adding to our list of integrators is Adrian Granados creator of the free Wifi tool for Mac called Airtool. Airtool is a free Mac OS X menu bar application that lets you check and configure wireless settings. It also performs captures across one or more Wi-Fi channels. In his version of Airtool 1.2, Adrian has been kind enough to add CloudShark as a target destination for captured packets.
We’re always excited whenever a new network tool or packet capture service is able to make use of the CloudShark API in order to integrate the seamless analysis of packet captures into their products. Integrators like AccessAgility’s Wifi Scanner are exactly what CloudShark was designed for.
Wifi Scanner Manager is a cloud-managed Wifi scanner that, when paired with WFS Agents, lets them become instant WiFi scanners and performance testers. You can find access points, determine their connectivity, do quick spot surveying, and find unauthorized access points.
This challenge is complete! Try it yourself or scroll to the solution below.
It’s been awhile since we’ve had a good old fashioned packet capture challenge here at CloudShark. In preparation for our upcoming webinar on packet capture and analysis in wireless networks, we thought we’d throw out a challenge involving a would-be malicious attacker trying to gain access to a secured wifi network.
The Challenge Take a look at this capture.
Watch the video. Wireless networks are the most ubiquitous type of network modern IT departments need to deal with. There are many tools for troubleshooting them, but what happens when you need to go to the packet level? How do you capture at the point you need, and how do you get those captures to a place you can analyze them?
Join the CloudShark team as we show you: