Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.internet.wireless    |    Fun with wireless Internet access    |    55,960 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 55,656 of 55,960    |
|    Marian to Marian    |
|    Re: Discussion: How to set up your mobil    |
|    05 Dec 25 00:21:52    |
      XPost: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone       From: marianjones@helpfulpeople.com              Marian wrote:       > Hence, an active scanner, if it "waits long enough" and if it captures       > authentication traffic, can capture these frames and learn the SSID but       > only if a client connects, as if no client connects, a passive scanner will       > only know the BSSID, not the SSID of the router's access point.              It's nearly impossible to find the official iOS/Android stance on whether       the BSSID of a hidden access point is "collected" or "uploaded" to       Apple/Google servers, but we can look at when the SSID is sent in the       clear.              1. For an average dumbshit user, he has his router set to defaults,        so the SSID is sent in cleartext in the beacon frames from the AP.        This happens "periodically" (perhaps every 100ms or so).        However, if the SSID is hidden, the beacon SSID field is blank.              2. If a random scanner passes by, it often sends wildcard probe requests.        The access points set up by dumbshits respond with a probe response        that includes their SSID in cleartext but not if the SSID is hidden.              3. An access point set up to be hidden will never include the SSID in the        probe response, and, depending on the firmware, it will either stay        silent or it will reply with a probe response with a blank SSID field.              4. The only way an AP reveals the SSID in the clear is if the client sends        a directed probe request (with the SSID filled in) because then the AP        will respond with a probe response that includes the SSID in the clear.              If no client ever sends out a directed probe request, then the SSID will       never be found in any packet that can be sniffed by any nearby scanner.              What happens in the case of a hidden SSID with auto-reconnect turned off is       a. ONLY when you physically manually initiate a connection to a hidden SSID       b. The client sends a directed probe request containing the hidden SSID.       c. The access point repeats the hidden SSID in the directed probe response       d. The client sends an association request containing the hidden SSID       e. The AP sends an association response containing the hidden SSID       f. Encrypted authentication handshakes & encrypted traffic follow              While the BSSID remains visible in all subsequent frames, the SSID is no       longer exposed in later frames, whether or not the AP SSID is hidden.              The only time re-association could occur is if you manually disconnect from       one AP and then manually connect to another AP with the same hidden SSID.              If a random iOS/Android phone is sitting outside your house, and if your       phone manually connects during that hour to the hidden SSID access point,       the random phone outside can see the hidden SSID in cleartext. It will       appear in the probe request, probe response, association request, and       association response frames. After the connection is established, the SSID       disappears from later traffic, but by then the random phone has already       captured it.              But wait, there's more.              Wi-Fi frames are only visible to a sniffer if it is tuned to the same RF       channel as the AP at the moment those frames are exchanged. And that       exchange typically takes only about a second to complete. So the window in       which the hidden SSID is in the clear is extremely short, especially for       the 5GHz range since there are more channels the sniffer has to scan.              The probability of capture depends on channel scanning behavior where a       random phone scanning all channels may miss it, but a dedicated sniffer       locked to the AP's channel will always catch it instantly.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca