Have you heard that hiding your SSID is a good idea? Think again.
With BackBox or Kali (in fact in form of Linux), you can run sudo airodump-ng phy1.mon at a terminal (replace phy1.mon with your network card number) – onboard cards would be phy0.mon.
Using a WINDOWS computer, you can type netsh wlan show networks mode=BSSID and see all networks and information about the network including hidden networks.
You will also see the Hidden Network using Windows 10 GUI. Although this network is ‘OPEN’, you’ll have to guess the name to connect to the network which is nearly impossible.
What you can do is install BackBox or Kali and use Airodump-ng. Below you will see airodump running and the network card is phy1.mon (replace this with phy(number).mon . The numeric value is the number of your card. 0 will be onboard and 1 will be an add-on card.
As you can see below (top half) that there are two SSIDs you can connect to. You will also see that no one is associating or deauthenticating with the Wireless that is available.
If you wait long enough, someone will associate with the SSIDs – Here you will see someone connecting to one of the Wireless Access Points. (look below ‘Probe’ and you will see the Station that is associating with the AP.
Waiting a few more minutes, you will see another station authenticating with the Wireless AP (look under ‘Probe- you’ll now see two stations associated with the SSID).
When a wireless access point comes online, (look below the arrow) – you’ll see the number of characters the name is (in this case it is nine), yet hidden.
When a station authenticates or connects to the ‘hidden network’ you’ll see the SSID name of the hidden network. In this case, look below ‘Probe’ and you will see Tomato242 which we set up to find.
So is hiding an SSID a good thing to do? It is one step of obfuscation. The other steps include – setting the WAP to WPA2 (CCMP/AES), using mac filtering and keeping your passphrase confidential.
In the scenario above, when the Wireless came online and was open, because it does not have a password, you could connect to this wireless AP just be clicking on hidden and typing in no password.