Bypass hidden SSID in wireless network

ESSID (Extender Service Set Identifier) ​​is the sequence of characters that uniquely identifies a wireless LAN. Hiding ESSID is a bad security method through invisibility. Unfortunately, ESSID can be displayed by:

  • Sniffing in the wireless environment and waiting for a client to connect to a network and then record this correlation.
  • Doing deauthenticating to a client, to force the client to connect and then capturing that correlation.

The most important tool for penetration testing in a wireless network is the wireless adapter, which is connected to the access point. It must support the tools used, such as aircrack-ng.

In particular, the card chipset and drivers should be able to import wireless packets into a communication stream. This is a prerequisite for attacks that require the injection of certain types of packets into the traffic flow between the target and the perpetrator. Imported packets can cause denial of service, allowing an attacker to capture handshake data needed to crack the encryption key or support other wireless attacks.

The most reliable adapters that can be used with Kali are the cards ALFA NETWORK, especially adapters AWUS036NH, which support 802.11 b, g and n wireless protocols. Alfa cards are readily available online and will support all tests and attacks using Kali.

Aircrack tools are particularly suitable for retrieving the data needed to hide a hidden ESSID, as shown in the following steps:

At the terminal, confirm that the wireless network is activated in the attack system by entering the following command:

Mandate: iwconfig

Turn on your wireless interface by entering the following (you may need to replace the wlan0 with an available wireless interface specified in the previous step):

Command: airmon-ng start wlan0

If you type ifconfig again, you will see that there is now an address wlan0mon in use. Now, use airodump to confirm the available wireless networks, as given in the following command:

Command: airodump-ng wlan0mon

It is no longer used or generally some other name. The hidden ESSID length is recognized as consisting of certain characters.

However, this value may not be correct because the ESSID is hidden. The actual ESSID length can actually be less than or greater than 10 characters.

What is important is that there may be connected clients on this particular network. If there are clients, we will deauthenticate the clients, forcing them to send the ESSID when they reconnect.

Run airodump again and filter everything except the target access point. In this particular case, we will focus on gathering data from the hidden network at 11, using the following command: “airodump -ng -c 11 wlan0mon"

Executing the command removes the output from multiple wireless sources and allows the attacker to focus on the target ESSID.

The data we receive when the airodump command is executed indicates that there is a station ( 40:F0:2F:DC:7A:59 ) connected to BSSID ( 84:10:0D:9E:A1:CD ) and is related to the hidden ESSID.

To record the ESSID as it is transmitted, we need to create a condition where we know it will be sent at the initial stage of the connection between a client and the access point.

Therefore, we will launch an attack on her certification s of both the client and the access point, sending a stream of packets that breaks the connection between them and forces them to re-authenticate.

To start the attack, open a new terminal and enter the command as shown in the image below.

Command: aireplay-ng -0 10 -a 84: 10: 0D: 9E: A1: CD -c 40: F0: 2F: DC: 7A: 59 wlan0mon

Here, the 0 indicates that we are launching a deauthentication attack, the 10 indicates that we will send 10 deauthentication packages, the -a is the target access point and c is the MAC address of the client

After all deauthentication packages have been sent, return to the original window that monitors the network connection in channel 11, as shown in the image below. You will now see ESSID clearly.

Knowledge of ESSID helps an attacker to confirm that he is focusing on the right network and facilitates the connection process. The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).