CAPEC-613: WiFi SSID Tracking

Detailed Draft 严重程度: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

In this attack scenario, the attacker passively listens for WiFi management frame messages containing the Service Set Identifier (SSID) for the WiFi network. These messages are frequently transmitted by WiFi access points (e.g., the retransmission device) as well as by clients that are accessing the network (e.g., the handset/mobile device). Once the attacker is able to associate an SSID with a particular user or set of users (for example, when attending a public event), the attacker can then scan for this SSID to track that user in the future.

前提条件

  • None

所需技能

Low Open source and commercial software tools are available and open databases of known WiFi SSID addresses are available online.

缓解措施

Do not enable the feature of "Hidden SSIDs" (also known as "Network Cloaking") – this option disables the usual broadcasting of the SSID by the access point, but forces the mobile handset to send requests on all supported radio channels which contains the SSID. The result is that tracking of the mobile device becomes easier since it is transmitting the SSID more frequently.

Frequently change the SSID to new and unrelated values

关键信息

CAPEC ID: CAPEC-613

抽象级别: Detailed

状态: Draft

典型严重程度: Low

相关攻击模式
相关CWE弱点