Detect Hidden SSID

A lot of organization hides their Service Set Identifier(SSID) for security purposes. In this post, I will teach you on how to unmask hidden SSID by utilizing airmon-ng on your Linux System.

Aircrack-ng is used to capture packets for monitoring the network traffic. It is used to check if the network is defenseless against any threat.

STEP START

STEP 1 Run airmon-ng in monitor mode

C:\>airmon-ng start eth1

STEP 2 → Start airodump-ng to display SSID on interface

C:\>airodump-ng --ivs --write capture eth1

BBSID              PWR  RXQ  Beacons #Data #/s CH  MB   ENC  CIPHER  ESSID
02:24:2A:BC:89:FE  99   5    61      3     9   1   54e  OPN  WEP     GLOBBE_WIFI
02:24:2A:BC:89:DD  99   9    76      4     0   4   54e  OPN          SMMART_WIREL
00:12:6C:69:5D:CC  99   0    16      1     0   8   54e  WEP  WEP     SOGOOD_HOTEL
00:33:4F:AE:69:7E  70   70   158     2     0   10  54e  WEP  WEP     <length:10>

BBSID              Station            PWR  Rate   Lost  Packets Probes
00:33:4F:AE:69:7E  00:16:8A:B2:BD:B1  -1   1-0    0     1
00:33:4F:AE:69:7E  00:1F:4C:CB:B6:BC  77   1d-53  0     6

STEP 3 → use aireplay-ng to display hidden SSID

C:\>aireplay-ng --deauth 11 -a 00:33:4F:AE:69:7E

BBSID              PWR  RXQ  Beacons #Data #/s CH  MB   ENC  CIPHER  ESSID
00:33:4F:AE:69:7E  70   70   158     2     0   10  54e  WEP  WEP     HIDDEN_MEEKEY 

STEP END

DISCLAIMER: Spydlawr does not promote, encourage, and support any sort of illegal activity. This statement is declaring that the content is for informational or educational purposes only.

Leave a comment