Kali Linux or a Linux install with the tools used below.In order to follow along with this post you will need a few things to get started. For this post I will show how we can decloak these types of networks and connect to them. Just sitting in my house writing I can see 3 hidden SSIDs that are open, presumably because people felt like if they hide them there is no need to secure them. The problem is that anyone can use some basic tools to not only find out that your network exists but they can decloak them to recover the name which is what this post will look at. There was a point in time when many wireless networks were open and this was a useful feature if there was some reason you needed the network to be open and you didn't want people randomly connecting since for most users the "if you can't see it you can't connect to it" mantra was true enough. On the surface this makes sense, after all how can you connect to something that you don't know is there. Hidden SSIDs are not a security featureĭespite the popular belief with some IT departments and technologists that hiding SSIDs is a security feature. This brief tutorial looks to debunk the myth that hiding your wireless SSID is makes helps secure your network by showing how easily you can recover the name of any hidden wireless network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |