Hidden SSID? Is it really hidden?


In the world of wireless network security, hiding your SSID might seem like an easy way to protect your WiFi network from unauthorized access. This approach of hiding an SSID provides a little more than a false sense of security. In my recent experience of debugging an issue with where random users could see these Hidden SSID’s, lead me to write a blog about why I personally believe it is not a great approach and I am open to opinions.

Let’s explore how Hidden SSIDs Works and understand with a real world example! 

When you configure your Access Points to hide the SSID/WLAN, you are essentially telling it to stop broadcasting the SSID name in the beacon frames. Under normal circumstances, An AP would periodically broadcast beacon frames containing, SSID Name, Channel, Security Capabilities etc. that helps a STA to choose among the broadcast SSID and associate to it.



With Hidden SSID enabled, the AP continues to broadcast beacon frames but removes the network/SSID filed for the respective WLAN. As seen in the capture below, the Beacon Frame shows the SSID field as Missing or Wildcard SSID and the length filed of the SSID is 0.

Beacon Frame:



This makes the network appear invisible to casual users looking at available WiFi networks on their devices. However, is it always true? 

When a device tries to connect to a hidden network it knows about, it sends out Probe Requests containing the SSID name. The AP then responds with a Probe response, confirming its presence. By looking at the Source Address of the Beacon for the Wildcard/Missing SSID and then the Source Address of Probe Response, one can easily tell that both are the just the same: 


Probe Request Frame: 


Probe Response Frame:



As shown above, probe requests and responses are transmitted in plain text, making them easily interceptable using basic tools like WiFi scanners, passive monitoring, and frame capture of Probe Request and Response frames. Recently, I observed hidden WLANs appearing on my Pixel-8 Phone, which made me question the very purpose of this feature. The phone was in a factory reset state and had no prior knowledge of the hidden WLAN. However, when a nearby device scanned for the hidden SSID, it started appearing in the network list. Although I couldn't click or connect to it, its presence was noticeable.



Hidden SSIDs represent a classic case of "security through obscurity" - an approach that provides more inconvenience than protection. While hiding your SSID might deter the most casual observers, it does nothing to prevent determined attackers from discovering and potentially!

Comments

Popular posts from this blog

Understanding RSSI and LQI Metrics of IOT

Understanding "Invalid FTE" Error with 802.11r Roaming

Association Failures with Legacy Printers due to Management Frame Protection- A Technical Analysis