Results 1 to 7 of 7

Thread: No essid problem ?

  1. #1
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    7

    Default No essid problem ?

    Is there any why to get essid if airodump doesnt displays it ? I need it for fakeauth attack. Or is it able to do this attack without knowing ap essid ?


    Thank you.

  2. #2
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    do a brodcast deauth ..........
    at the reconnexion time of clients if any you can get the essid........
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  3. #3
    Just burned his ISO
    Join Date
    Jul 2007
    Posts
    7

    Default

    So only way to get it is to do deauth attack is someone is connected, if not, there is no any way to do this ?

  4. #4
    Member
    Join Date
    May 2007
    Posts
    138

    Default

    Quote Originally Posted by black_wifi0 View Post
    So only way to get it is to do deauth attack is someone is connected, if not, there is no any way to do this ?
    Not as far as i know, so not broadcasting your SSID is one simple, (if somewhat rudimentary), way of protecting your AP from unwanted intruders.

    It is your router your trying to penetrate, right???

    Then just go to your router config and either set your SSID to broadcast, or just take a note of the SSID. So long as you know the SSID, then a Fake-Auth attack will work, regardless of whether the AP's actually broadcasting it or not. By the way, whilst your checking your SSID on the router's config page, you might also want to change it to a unique, (non-personally identifiable), name...ideally which doesn't appear on the Church of Wifi Rainbow Tables!!!

    You might also want to setup Mac Filtering on your AP as well, you can always make sure that your "attacking" Mac is on the accepted list to make attacks easier, (at least until you want to practice attacking APs with Mac Filtering enabled), because this is another thing that makes attacking an AP harder....it won't stop a determined attacker but it does throw a spanner in the works for any Script Kiddies trying to get in.

    Lastly, when you're not trying to hack your WEP key, make sure you set your AP's encryption to WPA/WPA2 with a long password, (20+ characters), comprising letters, numbers and punctuation marks....possibly randomly capitalising letters and staying away from dictionary type words.

    By doing all of the above, you should fairly safely protect your network from all but the most determined intruders....but of course, unless you have some extremely valuable/sensitive data then said intruder will just attack your neighbours comparatively insecure network instead

  5. #5
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    Quote Originally Posted by black_wifi0 View Post
    So only way to get it is to do deauth attack is someone is connected, if not, there is no any way to do this ?
    It doesnt make much sense to deauth nobody. stop trying to steal wifi its illegal

  6. #6
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Why don't you do what darkAudax posted instead of re-asking the same question here.
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  7. #7
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by PrairieFire View Post
    Why don't you do what darkAudax posted instead of re-asking the same question here.

    UUhhh OOOooo.!!!!!

    BUSTED!!!


    from [quote author=darkAudax link=topic=2085.msg11544#msg11544 date=1183576666]


    black_wifi0,

    Next time, search the forum or your question will be ignored. This has been answered many times over.

    You will have to wait for airodump-ng to display it or deauth a client.

    d.

    [/quote]


    Like he said bro..and what shaman said....DEAUTH or WAIT!!

    @prez ...sorry for the font thingy..just emphasizing the need to deauth or wait.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •