Skip to content

XVII. ESSID Stripping Attacks

Sølst1c3 edited this page Oct 7, 2023 · 1 revision

ESSID Stripping is a technique that involves adding a non-printable UTF8 character to the access point's ESSID to avoid new security settings on Wi-Fi clients, such as Microsoft. This security configuration stores the information of the old connections and notifies if there are any changes, blocking the automatic connections and not allowing access to the network. In addition, the user's credentials could be obtained in case the computer uses client certificate or computer credentials in the domain, because for Windows is a new network.

With this attack, the AP name is the same for the client, but Windows detects the full name as a new one, as it sees the non-printable characters. Then, the client asks for the username, password, etc. when logging in. Like a new network.

The options are:

  • '\r' for a new line.
  • '\t' for a tab.
  • '\n' for a enter, like '\r'.
  • '\x20' for a space, like adding a white space after the SSID option using quotes.

An example using the --essid-stripping '\r' parameter is shown below. In this case we use '\r' because is not showed by Android and it may go unnoticed as a new line in Windows, Linux and iOS.

python3 ./eaphammer -i wlan0 --auth wpa-eap --essid wifi-AP --creds --negotiate balanced --essid-stripping '\r'

Refs

EAPHammer Wiki

Clone this wiki locally