RE: Wireless SSID discovery

From: Todd Towles (toddtowles@brookshires.com)
Date: Wed Dec 22 2004 - 10:46:59 EST


Well, people need to do a bit of searching on their own. You can use
Hotspotter, Airsnort, Aircrack, WEPCrack, Void11, and I am sure they are
tons more of Wifi tools.

Good old Netstumbler will work in Windows with uncloaked broadcasting
Aps.

> -----Original Message-----
> From: Aaron Drew [mailto:amd@internode.on.net]
> Sent: Tuesday, December 21, 2004 4:47 PM
> To: pen-test@securityfocus.com
> Subject: Re: Wireless SSID discovery
>
> I'm surprised no-one has mentioned void11.
>
> This tool works with prism2 cards and injects a spoofed
> deauthentication message from the AP to the client. This
> forces the client to reconnect. If you have 2 cards or 2
> laptops, you can deauthenticate with one and listen for the
> SSID with kismet on another.
>
> On Tue, 21 Dec 2004 06:12 am, Todd Towles wrote:
> > Kismet doesn't need it to be broadcast to get the SSID, it looks at
> > the packets. As you sure you have the correct key?
> >
> > > -----Original Message-----
> > > From: Andrew Bagrin [mailto:abagrin@gmail.com]
> > > Sent: Sunday, December 19, 2004 8:43 PM
> > > To: pen-test@securityfocus.com
> > > Subject: Wireless SSID discovery
> > >
> > > I'm doing a wireless pen-test and am able to use aircrack
> to crack
> > > the wep key, however, when I use Kismet, Cain, airdump
> etc.. I can't
> > > get the SSID of a the access point if the SSID broadcast has been
> > > disabled. Does anyone know how to do this, or is there any tools
> > > that will let you get the SSID even if its not being broadcasted.
> > >
> > > Thanks,
> > >
> > > Andrew
>
> --
> - Aaron
>
> "Today's mighty oak is just yesterday's nut that held its ground."
>



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:11 EDT