


This is the reason why you see packets not meant for you.

However, Wireshark changed that, telling the interface firmware/driver that you actually want any packets arriving to it. This is done using the information encoded in the DST MAC field: if the destination MAC is equal to the interface MAC, the packet is accepted, otherwise it is dropped. Normally, when an interface receive the packets, it check if it should grab and process it or if it should discard the received frame. Share Improve this answer Follow answered at 13:50 Christopher Maynard 5,450 2 17 22 Im still trying to find a suitable tool. So the real question is: why packets from others IP arrive at your interface? It is due to how wireless ethernet networks work: the AP basically use its radio interface to broadcast packets to all nearby listener. The Wireshark wiki Tools page lists many packet capture related tools, among them some tools that can replay packets such as Bit-Twist, Pla圜ap, Scapy, tcpreplay and several others. Wireshark, being a network sniffer, put both the interface firmware (if present) and driver into promiscuous mode, meaning that it instruct the network stack to capure any packets arriving at your interface.
