On Sat, Sep 19, 2015 at 12:24 PM, Xen wrote:
Yeah. And I do know how to hack a WPA2 signal (the tutorials are there) but I do not know how to find an unadvertized SSID. So there you have it. Maybe if you can hook onto a key exchange / connection setup, you can find out. But I don't yet know if it is possible. So there you have it. You are protected against me :p.
When you hide the SSID on your router/access point, the access point sends out beacon frames that have the SSID set to a null value. When your computer or other device wants to connect to a wireless network with a hidden SSID, it has to issue a probe request that contains the SSID of the hidden network. Your access point now responds with the information required for your device to connect. So when devices are establishing a connection with a hidden SSID, the SSID is leaked. Hiding the SSID can actually decrease overall security because computers that are set to automatically connect to wireless networks are constantly sending probes with the SSID when looking for hidden SSIDs. When you set your computer to automatically connect to a non-hidden SSID, the computer only listens for the beacon frames from the access point your computer wants to connect to instead of having your computer will advertise what network it is searching for. This makes it easy for individuals to spoof your router/access point (when the SSID is hidden) and cause your computer to connect to their network. Brandon Vincent -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org