Wireless Hacking
◾
295
We selected the appropriate interface to sniff on, and we are now able to see beacon frames
from
other access points, which we are not associated with. Whenever the client authenticates
against the access point with the hidden SSID,
it will send an SSID parameter; therefore, we can
easily figure out what the real SSID is.
Monitoring with Airodump-ng
The easy way around is to use airodump-ng to
start monitoring the traffic; as soon as the client
authenticates, the SSID will be revealed.
Command
:
airodump-ng mon0
The access point that is not broadcasting it’s ESSID would appear with the names such as
“
”, as soon as the client would re-authenticate the hidden SSID would appear.