Many who are starting out with Wireshark think that just getting it running in 'promiscuous' mode on a WPA2 network is enough. Sadly, as opposed to open networks, there are a few more steps that need to be taken. This post will walk you through those additional steps. First you should know that there are… Continue reading Using Wireshark to Monitor WPA2 Protected Traffic