NDIS packet monitoring using Volatility (IEEE 802.1x protocol)
Is it possible to parse IEEE 802.1x from Volatility, an advanced memory forensics framework in Python? Here’s the link to the GitHub page: “https://github.com/volatilityfoundation/volatility?tab=readme-ov-file”. And from there, how do I exactly catch this OID: OID_802_11_PMKID where I can cast _BSSID_INFO structs and get all MAC address and PMKID pairs? Here’s the link to OID_802_11_PMKID: “https://learn.microsoft.com/en-us/previous-versions/windows/hardware/network/ff559321(v=vs.85)”.