Re: Wireless SSID discovery

From: Aaron Drew (amd@internode.on.net)
Date: Tue Dec 21 2004 - 17:47:09 EST


I'm surprised no-one has mentioned void11.

This tool works with prism2 cards and injects a spoofed deauthentication
message from the AP to the client. This forces the client to reconnect. If
you have 2 cards or 2 laptops, you can deauthenticate with one and listen for
the SSID with kismet on another.

On Tue, 21 Dec 2004 06:12 am, Todd Towles wrote:
> Kismet doesn't need it to be broadcast to get the SSID, it looks at the
> packets. As you sure you have the correct key?
>
> > -----Original Message-----
> > From: Andrew Bagrin [mailto:abagrin@gmail.com]
> > Sent: Sunday, December 19, 2004 8:43 PM
> > To: pen-test@securityfocus.com
> > Subject: Wireless SSID discovery
> >
> > I'm doing a wireless pen-test and am able to use aircrack to
> > crack the wep key, however, when I use Kismet, Cain, airdump
> > etc.. I can't get the SSID of a the access point if the SSID
> > broadcast has been disabled. Does anyone know how to do
> > this, or is there any tools that will let you get the SSID
> > even if its not being broadcasted.
> >
> > Thanks,
> >
> > Andrew

-- 
- Aaron
"Today's mighty oak is just yesterday's nut that held its ground."


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:11 EDT