Ready to Start Your Career?

By: bjacharya
March 29, 2016
Ethical Hacking with Kali Linux - Part 2: Finding Hidden SSIDS

By: bjacharya
March 29, 2016

airmon-ng start wlan0
– After executing above command, we must get a new interface mon0 (monitor mode enabled)– Verify that both interfaces are up and running, run:airmon-ng
– Watch for wlan0 and mon0, run:airodump-ng mon0
– For monitoring all the APs that Kali Linux OS can find out.– From next step, note BSSID and ESSID, if there is any hidden SSID, then ESSID will be format like this : <length: 0> [Notice, it’s CH (Channel) and BSSID]– CTRL+C (press)airodump-ng -c 1 mon0(Here, 1 is channel we notice/you notice. This value may differ.)
– After some time, you will notice <length: 0> changes and reveals SSID name.– If it takes lot of time to reveal SSID, we can follow de-authenticate process by cloning next terminal in Kali Linux.– Copy BSSID (MAC) of ch 1 #Deauth Attack:aireplay-ng -0 2 -a 00:A1:B2:11:20:13:5T mon0
– It sends de-auth to broadcastairodump-ng -c i mon0
– Wait– Go over to new Terminalaireplay-ng -0 2 -a 00:A1:B2:11:20:13:5T mon0
– Finally you will get SSID in ESSID section. A quick note: This series is only for educational purpose. Practice this series in a lab, in a virtual/separate network and always avoid illegal activities. If you can, then support us in fighting the bad guys.See the other posts in this series:Ethical Hacking with Kali Linux - Part 1: ObjectiveEthical Hacking with Kali Linux - Part 3: Bypassing Mac Address FilterEthical Hacking with Kali Linux - Part 4: Breaking WPA2 WirelessEthical Hacking with Kali Linux - Part 5: Rogue Wireless Access PointsEthical Hacking with Kali Linux – Part 6: Nmap (Network Mapper)By: Bijay Acharya (http://bijayacharya.com/) http://twitter.com/acharya_bijay