Initialize ssid_encryption_status dictionary in analyze_pcap function for tracking SSID encryption status
This commit is contained in:
parent
595a4b8774
commit
3f27473357
1 changed files with 1 additions and 2 deletions
|
@ -306,6 +306,7 @@ def analyze_pcap(pcapng_path, start_ts, end_ts, ap_bssid, ap_channel):
|
|||
bssid_to_ssid = {}
|
||||
cisco_reported_clients = []
|
||||
ssid_packet_counts = defaultdict(int)
|
||||
ssid_encryption_status = {}
|
||||
|
||||
try:
|
||||
# Filter packets manually by timestamp
|
||||
|
@ -318,8 +319,6 @@ def analyze_pcap(pcapng_path, start_ts, end_ts, ap_bssid, ap_channel):
|
|||
except Exception:
|
||||
continue
|
||||
|
||||
ssid_encryption_status = {}
|
||||
|
||||
for packet in filtered_packets:
|
||||
try:
|
||||
if 'radiotap' not in packet or 'wlan' not in packet:
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue