• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / infosec / Bypass hidden SSID in wireless network

Bypass hidden SSID in wireless network

18/02/2021 18:21 by Anastasis Vasileiadis

ESSID (Extender Service Set Identifier) ​​is the sequence of characters that uniquely identifies a wireless LAN. Hiding ESSID is a bad security method through invisibility. Unfortunately, ESSID can be displayed by:

  • Sniffing in the wireless environment and waiting for a client to connect to a network and then record this correlation.
  • Doing deauthenticating to a client, to force the client to connect and then capturing that correlation.
20200430wifi - Bypass hidden SSID in wireless network

The most important tool for penetration testing in a wireless network is the wireless adapter, which is connected to the access point. It must support the tools used, such as aircrack-ng.

In particular, the card chipset and drivers should be able to import wireless packets into a communication stream. This is a prerequisite for attacks that require the injection of certain types of packets into the traffic flow between the target and the perpetrator. Imported packets can cause denial of service, allowing an attacker to capture handshake data needed to crack the encryption key or support other wireless attacks.

The most reliable adapters that can be used with Kali are the cards ALFA NETWORK, especially adapters AWUS036NH, which support 802.11 b, g and n wireless protocols. Alfa cards are readily available online and will support all tests and attacks using Kali.

Aircrack tools are particularly suitable for retrieving the data needed to hide a hidden ESSID, as shown in the following steps:

At the terminal, confirm that the wireless network is activated in the attack system by entering the following command:

Mandate: iwconfig

hiddenwifi1 - Bypass hidden SSID in wireless network

Turn on your wireless interface by entering the following (you may need to replace the wlan0 with an available wireless interface specified in the previous step):

Command: airmon-ng start wlan0

hiddenwifi2 - Bypass hidden SSID in wireless network

If you type ifconfig again, you will see that there is now an address wlan0mon in use. Now, use airodump to confirm the available wireless networks, as given in the following command:

Command: airodump-ng wlan0mon

hiddenwifi3 - Bypass hidden SSID in wireless network

As you can see, the ESSID of the third network is only recognized as .

No other name or generally any other name is used. The hidden ESSID length is recognized as consisting of certain characters.

However, this value may not be correct because the ESSID is hidden. The actual ESSID length can actually be less than or greater than 10 characters.

What is important is that there may be connected clients on this particular network. If there are clients, we will deauthenticate the clients, forcing them to send the ESSID when they reconnect.

Run the airodump again and filter everything except the target access point. In this particular case, we will focus on collecting data from the hidden network on channel 11, using the following command:airodump-ng -c 11 wlan0mon"

Executing the command removes the output from multiple wireless sources and allows the attacker to focus on the target ESSID.

The data we receive when the airodump command is executed indicates that there is a station ( 40:F0:2F:DC:7A:59 ) connected to BSSID ( 84:10:0D:9E:A1:CD ) and is related to the hidden ESSID.

To record the ESSID as it is transmitted, we need to create a condition where we know it will be sent at the initial stage of the connection between a client and the access point.

Therefore, we will launch an attack against both client and access point authentication by sending a packet stream that interrupts the connection between them and forces them to verify authentication again.

To start the attack, open a new terminal and enter the command as shown in the image below.

Command: aireplay-ng -0 10 -a 84: 10: 0D: 9E: A1: CD -c 40: F0: 2F: DC: 7A: 59 wlan0mon

hiddenwifi4 - Bypass hidden SSID in wireless network

Here, the 0 indicates that we are launching a deauthentication attack, the 10 indicates that we will send 10 deauthentication packages, the -a is the target access point and c is the MAC address of the client

After all deauthentication packages have been sent, return to the original window that monitors the network connection in channel 11, as shown in the image below. You will now see ESSID clearly.

hiddenwifi5 - Bypass hidden SSID in wireless network

Knowledge of ESSID helps an attacker to confirm that he is focusing on the right network and facilitates the connection process.

Bypass hidden SSID in wireless network was last modified: 18 February, 2021, 6: 21 pm by Anastasis Vasileiadis

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: infosecDay: ESSID, SSID

You May Also Like

Test your security - Lesson 2o - Break a wifi password with WEP encryption in 5 minutes
A guide to complete anonymity on Linux with Tor
Crack WPA / WPA2-PSK with WiFiBroot

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Windows 10 21H1 Spring 2021 has just been released
Next Post: Rename a new folder in Windows 10 »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.