Penetration Testing mailing list archives

Re: Wireless SSID discovery


From: Seth Fogie <seth () fogieonline com>
Date: Wed, 22 Dec 2004 11:07:42 -0500

I am also surprised no one mentioned essid_jack. It too kicks current clients and monitors the reauthentication...all in one package.

Aaron Drew wrote:
I'm surprised no-one has mentioned void11. This tool works with prism2 cards and injects a spoofed deauthentication message from the AP to the client. This forces the client to reconnect. If you have 2 cards or 2 laptops, you can deauthenticate with one and listen for the SSID with kismet on another.

On Tue, 21 Dec 2004 06:12 am, Todd Towles wrote:

Kismet doesn't need it to be broadcast to get the SSID, it looks at the
packets. As you sure you have the correct key?


-----Original Message-----
From: Andrew Bagrin [mailto:abagrin () gmail com]
Sent: Sunday, December 19, 2004 8:43 PM
To: pen-test () securityfocus com
Subject: Wireless SSID discovery

I'm doing a wireless pen-test and am able to use aircrack  to
crack the wep key, however, when I use Kismet, Cain, airdump
etc.. I can't get the SSID of a the access point if the SSID
broadcast has been disabled.  Does anyone know how to do
this, or is there any tools that will let you get the SSID
even if its not being broadcasted.

Thanks,

Andrew




Current thread: