Wi-Fi Capture
The Wi-Fi Capture feature enables monitor-mode packet capture (sniffing) of wireless traffic using Wireshark integration. This powerful tool allows you to capture all Wi-Fi frames on a specific channel for detailed analysis.
Opening Wi-Fi Capture
Access Wi-Fi Capture in three ways:
- Toolbar Button - Click the Wi-Fi Sniffing button in the toolbar
- Menu Bar - Select Tools → Wi-Fi Sniffing
- Keyboard Shortcut - Press ⌘F
Prerequisites
Before using Wi-Fi Capture, you must have:
1. Wireshark Installed
Wi-Fi Capture requires Wireshark for packet capture in monitor mode.
Download: https://www.wireshark.org
Installation: Install Wireshark from the official DMG package
What PingStalker Checks:
- Wireshark installation at /Applications/Wireshark.app
- If not found, a warning appears with download link
2. BPF (Berkeley Packet Filter) Access
Monitor mode requires BPF device access.
How to Enable: 1. Click the warning banner if shown 2. Install ChmodBPF utility (included with PingStalker or Wireshark) 3. Restart PingStalker
What This Does: Grants permissions to access BPF devices (/dev/bpf*) required for packet capture
Also Needed For: Network Logs active monitoring
Wi-Fi Capture Window
The capture window provides interface, channel, and control options:
Interface Selection
Choose which Wi-Fi interface to use for capture:
Single Wi-Fi Mac: - Typically shows "Wi-Fi (en0)" - Uses your only Wi-Fi adapter
Multiple Wi-Fi Macs: - Shows all Wi-Fi interfaces - Example: "Wi-Fi (en0)", "Wi-Fi 2 (en1)" - Useful for Macs with multiple adapters or USB Wi-Fi dongles
Note: The selected interface will be disconnected from its network during capture and placed in monitor mode.
Channel Selection
Choose the wireless channel to monitor:
2.4 GHz Band
Available Channels: 1-14 (region dependent)
5 GHz Band
Available Channels: Multiple non-overlapping channels Channel Widths: 20, 40, 80, 160 MHz
6 GHz Band (Wi-Fi 6E)
Available Channels: 1-233 (with 6 GHz capable hardware)
Changing Channels During Capture
You can change channels while capture is running without stopping:
- Wireshark remains open
- Select a different channel in PingStalker
- The Wi-Fi interface switches to the new channel
- Wireshark continues capturing on the new channel
Use Case: Monitor multiple channels in a single capture session to find hidden networks or analyze roaming
Starting a Capture
To begin packet capture:
- Select the Wi-Fi interface
- Choose the channel and width
- Click Start Capture
What Happens
Step 1: PingStalker disassociates your Wi-Fi interface from its current network
Step 2: Interface is placed in monitor mode
Step 3: Interface is set to the selected channel
Step 4: Wireshark launches automatically with the interface in monitor mode
Step 5: Packet capture begins immediately
Status Display: - "Capturing on channel X" - Interface name and channel displayed - Wireshark window opens
Wireshark Integration
PingStalker launches Wireshark with:
- Monitor mode enabled
- Correct interface selected
- Capture started automatically
- Real-time packet display
What You See in Wireshark: - All Wi-Fi frames on the selected channel - Management frames (beacons, probes, association) - Control frames (ACK, RTS/CTS) - Data frames (encrypted payload)
Stopping a Capture
When you're done capturing:
- In Wireshark: Stop the capture (red square button)
- Save the capture file (
.pcapor.pcapng) if desired - In PingStalker: Click Stop Capture or close the window (PingStalker should auto-detect when you stop the capture)
Automatic Reconnection
When capture stops, PingStalker automatically:
- Removes the interface from monitor mode
- Re-enables managed mode
- Attempts to reconnect your device to your previous Wi-Fi network
Restarting Wi-Fi Interface
If your Wi-Fi interface becomes unresponsive or stuck, use the Restart Wi-Fi Interface button.
Capture Use Cases
1. Network Discovery
Purpose: Find hidden SSIDs and all access points
Method:
1. Capture on common channels (1, 6, 11 for 2.4 GHz)
2. Filter for beacon frames in Wireshark: wlan.fc.type_subtype == 0x08
3. Identify all broadcasting SSIDs and BSSIDs
See: Hidden networks that don't appear in normal Wi-Fi scans
2. Channel Analysis
Purpose: Identify interference and overlapping networks
Method: 1. Capture on target channel with widest bandwidth 2. Count beacon frames from different BSSIDs 3. Analyze channel utilization
Wireshark Filter: wlan.fc.type_subtype == 0x08
Use: Plan channel assignments for optimal performance
3. Roaming Analysis
Purpose: Observe client roaming behavior
Method: 1. Capture on primary channels 2. Filter for association/reassociation frames 3. Track client MAC moving between BSSIDs
Wireshark Filters:
- Association Request: wlan.fc.type_subtype == 0x00
- Reassociation Request: wlan.fc.type_subtype == 0x02
4. Security Assessment
Purpose: Identify security weaknesses
Method: 1. Capture on all channels in use 2. Identify WPA/WPA2/WPA3 usage 3. Look for open networks or weak security
Wireshark Filter: wlan.rsn.version or wlan.wep.key
Note: Capturing encrypted data doesn't decrypt it. This is for network audit purposes.
5. Troubleshooting Connectivity
Purpose: Diagnose connection failures
Method:
1. Capture during connection attempt
2. Watch 4-way handshake: eapol
3. Identify authentication failures
See: Deauthentication reasons, failed associations, EAP failures
Analyzing Captures
Common Wireshark Filters
Beacon Frames (AP broadcasts):
wlan.fc.type_subtype == 0x08
Probe Requests (client searching):
wlan.fc.type_subtype == 0x04
Data Frames:
wlan.fc.type == 2
Specific SSID:
wlan.ssid == "YourNetworkName"
Specific Device (by MAC):
wlan.addr == 00:11:22:33:44:55
WPA Handshake:
eapol
Deauthentication:
wlan.fc.type_subtype == 0x0c
Viewing Statistics
In Wireshark:
Wireless → WLAN Traffic: - See all detected SSIDs and BSSIDs - Packet counts per network - Channel distribution
Statistics → Protocol Hierarchy: - Breakdown of frame types - Management vs. control vs. data frames
Statistics → Conversations: - Which devices are communicating - Data transfer amounts
Important Notes
Network Disruption
During Capture: - Selected Wi-Fi interface cannot access the internet - Any running downloads or connections on that interface are interrupted - Other interfaces (Ethernet, other Wi-Fi adapters) continue working
Use Case Recommendation: - Capture on secondary Wi-Fi adapter if available - Or accept temporary disconnection during capture
Legal Considerations
You May: - Capture on networks you own or have permission to monitor - Analyze your own wireless traffic - Perform authorized security assessments - Troubleshoot connectivity issues
You May Not: - Capture traffic on networks without authorization - Decrypt others' encrypted communications - Use captures for unauthorized access attempts - Violate wiretapping or eavesdropping laws
Always: Obtain proper authorization before capturing Wi-Fi traffic
Troubleshooting
"Wireshark Not Found"
Solution:
1. Download from https://www.wireshark.org
2. Install to /Applications/Wireshark.app
3. Restart PingStalker
"BPF Access Required"
Solution:
1. Click warning banner
2. Install ChmodBPF
3. Restart PingStalker
4. Verify /dev/bpf* devices exist with proper permissions
Capture Starts But No Packets
Causes: - Wrong channel selected - No traffic on selected channel - Interface not in monitor mode
Solutions: - Change to busier channel - Verify Wireshark shows monitor mode - Close Wireshark, and try again.
Wi-Fi Capture is a powerful tool for network analysis and troubleshooting. Use it responsibly and always with proper authorization. Combine with Wireless Details for comprehensive Wi-Fi analysis.



