294
◾
Ethical Hacking and Penetration Testing Guide
administrator disables an SSID. This is said to be a good security practice according to many
network administrators; however, this terribly fails in real-world situations. The reason being that
anytime a client reassociates with the access point, it will send the SSID parameter in plain text,
which will reveal the real SSID.
Now, we have two methods to do this: the first one is that we keep analyzing beacon frames
and wait for the client to disconnect and reconnect to the access point; the second option is that
we send disassociation packets by using a deauthentication attack, which will force everyone on
the network to disconnect and then reconnect to the access point revealing to us the SSID. So let’s
see this in action.
Dostları ilə paylaş: