Results 1 to 6 of 6

Thread: Got no ssid!! Do i need it to attack

  1. #1
    Just burned his ISO
    Join Date
    Aug 2007
    Posts
    4

    Default Got no ssid!! Do i need it to attack

    I tried out kismet, and it shows me the only one Ap around me, its my network wich i wonna attack,

    The config of my wlan is, a 128 wep key, and i hide the ssid.

    my question is, do i need the ssid to attack the network or is there another way to say Attack especially this Network with airodump.

    Thanks a lot for comments

  2. #2
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    Quote Originally Posted by xcerberus View Post
    I tried out kismet, and it shows me the only one Ap around me, its my network wich i wonna attack,

    The config of my wlan is, a 128 wep key, and i hide the ssid.

    my question is, do i need the ssid to attack the network or is there another way to say Attack especially this Network with airodump.

    Thanks a lot for comments
    Yes you must have the essid to asociate with the network which is needed to inject. Keep running kismet or airodump untill you get it. If you add a client to the network and deauth him it will also provide the essid when the client reassosiates

  3. #3
    Member imported_blackfoot's Avatar
    Join Date
    Jun 2007
    Posts
    386

    Default passive

    Programs such as kismet 'sniff' passively. That is to say they do not generate any activity. Any hidden ssid will be reveled as soon as kismet collects data as the station and ap communicate together typically through data transfer or probing. So to reveal the ssid with passive sniffing the program or script will need to observe activity.

    Since this is your own network and you know the essid and bssid why don't you simply insert the details in your analysis script as if your passive sniffer had detected it?
    Lux sit

  4. #4
    Member
    Join Date
    May 2007
    Posts
    138

    Default

    Failing that, just uncheck the "Don't broadcast ESSID" check box...problem solved!

  5. #5
    Just burned his ISO
    Join Date
    Aug 2007
    Posts
    4

    Default

    your way is the simple way, but i dont like the simple ways, everything a human build can be destroyed by a human on any way, i choose the hard way

    but thanks i found out what i need to do

  6. #6
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    on that note then,

    Thread closed.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •