Penetration Testing mailing list archives

RE: Wireless SSID discovery


From: "Todd Towles" <toddtowles () brookshires com>
Date: Wed, 22 Dec 2004 09:46:59 -0600

Well, people need to do a bit of searching on their own. You can use
Hotspotter, Airsnort, Aircrack, WEPCrack, Void11, and I am sure they are
tons more of Wifi tools.

Good old Netstumbler will work in Windows with uncloaked broadcasting
Aps. 

-----Original Message-----
From: Aaron Drew [mailto:amd () internode on net] 
Sent: Tuesday, December 21, 2004 4:47 PM
To: pen-test () securityfocus com
Subject: Re: Wireless SSID discovery

I'm surprised no-one has mentioned void11. 

This tool works with prism2 cards and injects a spoofed 
deauthentication message from the AP to the client. This 
forces the client to reconnect. If you have 2 cards or 2 
laptops, you can deauthenticate with one and listen for the 
SSID with kismet on another.

On Tue, 21 Dec 2004 06:12 am, Todd Towles wrote:
Kismet doesn't need it to be broadcast to get the SSID, it looks at 
the packets. As you sure you have the correct key?

-----Original Message-----
From: Andrew Bagrin [mailto:abagrin () gmail com]
Sent: Sunday, December 19, 2004 8:43 PM
To: pen-test () securityfocus com
Subject: Wireless SSID discovery

I'm doing a wireless pen-test and am able to use aircrack 
 to crack 
the wep key, however, when I use Kismet, Cain, airdump 
etc.. I can't 
get the SSID of a the access point if the SSID broadcast has been 
disabled.  Does anyone know how to do this, or is there any tools 
that will let you get the SSID even if its not being broadcasted.

Thanks,

Andrew

--
- Aaron

"Today's mighty oak is just yesterday's nut that held its ground."



Current thread: