Describe three limitations of SSID hiding.

What will be an ideal response?


The SSID can be easily discovered even when it is not contained in beacon frames because it is transmitted in other management frames sent by the AP. Attackers with protocol analyzers can still detect the SSID even when SSID hiding is being used.
The SSID is initially transmitted in plaintext (unencrypted) form when the device is negotiating with the AP. If an attacker cannot capture an initial negotiation process, it can force one to occur. An attacker can send a forged disassociation frame to a wireless device. This will cause the device to disassociate from the AP. When the device immediately attempts to reconnect to the AP, the attacker can capturing frames and see the SSID transmitted in plaintext.
SSID hiding may prevent users from being able to freely roam one AP coverage area to
another.
Turning off SSID beaconing is not always possible or convenient. SSID beaconing is the default mode in every AP. Even more so, not all APs allow beaconing to be turned off, and those that do often discourage users from making this change.
Versions of Microsoft Windows XP, when receiving signals from both a wireless network
that is broadcasting an SSID and one that is not broadcasting the SSID, will always connect to the AP that is broadcasting its SSID. If a Windows XP device is connected to an AP that is not broadcasting its SSID, and another AP is turned on that is broadcasting its SSID, the device will automatically disconnect from the first AP and connect to the AP that is broadcasting.
The SSID can be retrieved from an authenticated device.
Because many users do not change the default SSID, an attacker can simply try using default SSIDs until the correct value is accepted.

Computer Science & Information Technology

You might also like to view...

What is the Big-O performance of Dijkstra's algorithm?

a. O(V^2+E) b. O(V^2) c. O(V+E)^2 d. O(V)

Computer Science & Information Technology

Which of the following is NOT true about hyperlinks within presentations?

A) Hyperlinks are objects, such as text or graphics, that provide a path to additional resources. B) You can hyperlink to slides that are not in the normal progression of the slides. C) With a kiosk presentation, this gives the audience an opportunity to interact with the presentation. D) You can provide hyperlinks to Internet resources, such as e-mail and the web.

Computer Science & Information Technology

With the ____ brush mode, the painted pixels resemble the Paint Brush color while retaining the texture of the original pixels.

a. Color b. Retention c. Texture d. Original

Computer Science & Information Technology

What voltage does an orange pin indicate?

a. +12 V b. +5 V c. -5 V d. +3.3 V

Computer Science & Information Technology