1 00:00:00,900 --> 00:00:09,120 So let's have a look at detecting some of the encryption algorithms used by the device in Wireshark. 2 00:00:10,470 --> 00:00:17,900 As you see here in the screenshot, the privacy bed of the selected device shows that it supports WPE. 3 00:00:19,100 --> 00:00:27,830 There are no indications that the device is using WIPA, so it's clear that it is using weap encryption. 4 00:00:29,850 --> 00:00:36,540 In a screenshot, the details in the middle section of Wireshark also show that the device supports 5 00:00:37,160 --> 00:00:42,570 encryption algorithms because there is a WPA version information here. 6 00:00:43,510 --> 00:00:50,470 And then if you look down a little further, there is WPA to information, so obviously the device will 7 00:00:50,470 --> 00:00:52,150 support the WPA to. 8 00:00:53,310 --> 00:01:03,120 Now, if you remember, the WPA, too, is also called Robust Security Network, so protocol details 9 00:01:03,120 --> 00:01:08,040 will be explained under the IRS, RCN information tag.