Re: Wireless SSID discovery

From: Seth Fogie (seth@fogieonline.com)
Date: Wed Dec 22 2004 - 11:07:42 EST


I am also surprised no one mentioned essid_jack. It too kicks current
clients and monitors the reauthentication...all in one package.

Aaron Drew wrote:
> I'm surprised no-one has mentioned void11.
>
> This tool works with prism2 cards and injects a spoofed deauthentication
> message from the AP to the client. This forces the client to reconnect. If
> you have 2 cards or 2 laptops, you can deauthenticate with one and listen for
> the SSID with kismet on another.
>
> On Tue, 21 Dec 2004 06:12 am, Todd Towles wrote:
>
>>Kismet doesn't need it to be broadcast to get the SSID, it looks at the
>>packets. As you sure you have the correct key?
>>
>>
>>>-----Original Message-----
>>>From: Andrew Bagrin [mailto:abagrin@gmail.com]
>>>Sent: Sunday, December 19, 2004 8:43 PM
>>>To: pen-test@securityfocus.com
>>>Subject: Wireless SSID discovery
>>>
>>>I'm doing a wireless pen-test and am able to use aircrack to
>>>crack the wep key, however, when I use Kismet, Cain, airdump
>>>etc.. I can't get the SSID of a the access point if the SSID
>>>broadcast has been disabled. Does anyone know how to do
>>>this, or is there any tools that will let you get the SSID
>>>even if its not being broadcasted.
>>>
>>>Thanks,
>>>
>>>Andrew
>
>



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:11 EDT