Anyone know how to get ESSID when airodump-ng shows an open network? These guys used to broadcast their AP names and I could connect with no password. Now they're hiding.
use the BSSID, retard
>>60524987
how?
>>60525528
Fucking hell. Did you even read the cunting documentation?
>>60525746
without the essid you can't connect to the network. mac address alone is not enough
>>60525785
mac address alone is enough and you're a dumbass
>>60524958
>channel 148
>>60525916
you can't supply any proof to support your claim because none exists, iow You Are Wrong
>>60526142
>I didn't read the documentation and I expect everyone to spoon-feed me waaaaahhhhh
>>60526511
The documentation says for you to shut your fat ugly face.
>>60524958
>1 deauth ap
>2 wait for client to reconnect
>3 ???????
>4 profit
>>60526511
https://www.aircrack-ng.org/doku.php?id=airodump-ng#hidden_ssids_length
Hidden SSIDs "<length: ?>"
You will sometimes see “<length: ?>” as the SSID on the airodump-ng display. This means the SSID is hidden. The “?” is normally the length of the SSID. For example, if the SSID was “test123” then it would show up as “<length: 7>” where 7 is the number of characters. When the length is 0 or 1, it means the AP does not reveal the actual length and the real length could be any value.
To obtain the hidden SSID there are a few options:
Wait for a wireless client to associate with the AP. When this happens, airodump-ng will capture and display the SSID.
Deauthenticate an existing wireless client to force it to associate again. The point above will apply.
Use a tool like mdk3 to bruteforce the SSID.
You can use Wireshark combined with one or more of these filters to review data capture files. The SSID is included within these packets for the AP.
wlan.fc.type_subtype == 0 (association request)
wlan.fc.type_subtype == 4 (probe request)
wlan.fc.type_subtype == 5 (probe response)
>>60526598
>projecting this hard
>>60526641
Thanks, I was hoping there was an easier way because there is no passphrase encryption.