Description: In the previous video, we looked at how to create a simple SSID sniffer using Python in just 10 lines. Now let's look at the client side of Wi-Fi. In the Wi-Fi Security Megaprimer we saw how isolated roaming Wi-Fi clients send out Probe Request packets searching for Wi-Fi networks in their saved configuration. We also saw how an attacker could create honeypots with tools like Airbase-ng and Hostapd to lure the client to connect to them and then exploit them. In this video, we will look at how to find which SSIDs Clients in the same RF vicinity are probing for using Python (Scapy is the lib we will use).
More Information:
Wi-Fi Security Megarimer: http://www.securitytube.net/groups?operation=view&groupId=9
In case you need more help / advanced courses then please check out the below:
SecurityTube Wi-Fi Security Expert: http://securitytube-training.com/certifications/securitytube-wi-fi-security-expert/
SecurityTube Python Scripting Expert: http://securitytube-training.com/certifications/securitytube-python-scripting-expert/
Enjoy and please do leave your comments behind!
Tags: hod , python , wifi , client , probe request ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Love this site and viveks work! iv learned so much and love these hacks of the day. Thank you !
Another nice quick hack. You could have used the 2 lines you had left to only print previously unseen MAC/SSID combinations. Just saying. :-)
I really like that we've been utilizing the power of scapy!
Pentest With Backtrack 5 Course with virtual labs at www.TestStone.com .