Hidden SSID? Is it really hidden?
In the world of wireless network security, hiding your SSID might seem like an easy way to protect your WiFi network from unauthorized access. This approach of hiding an SSID provides a little more than a false sense of security. In my recent experience of debugging an issue with where random users could see these Hidden SSID’s, lead me to write a blog about why I personally believe it is not a great approach and I am open to opinions.
Let’s explore how Hidden SSIDs Works and understand with a real world example!
When you configure your Access Points to hide the SSID/WLAN, you are essentially telling it to stop broadcasting the SSID name in the beacon frames. Under normal circumstances, An AP would periodically broadcast beacon frames containing, SSID Name, Channel, Security Capabilities etc. that helps a STA to choose among the broadcast SSID and associate to it.
With Hidden SSID enabled, the AP continues to broadcast beacon frames but removes the network/SSID filed for the respective WLAN. As seen in the capture below, the Beacon Frame shows the SSID field as Missing or Wildcard SSID and the length filed of the SSID is 0.
Beacon Frame:
This makes the network appear invisible to casual users looking at available WiFi networks on their devices. However, is it always true?
When a device tries to connect to a hidden network it knows about, it sends out Probe Requests containing the SSID name. The AP then responds with a Probe response, confirming its presence. By looking at the Source Address of the Beacon for the Wildcard/Missing SSID and then the Source Address of Probe Response, one can easily tell that both are the just the same:
Hidden SSIDs represent a classic case of "security through obscurity" - an approach that provides more inconvenience than protection. While hiding your SSID might deter the most casual observers, it does nothing to prevent determined attackers from discovering and potentially!



Comments
Post a Comment