As devices store a list of previously used hotspots, the preferred network list in a WiFi client device is an intriguing source of private location information. This post will teach you how to perform reconnaissance using preferred network lists.
Hello World! When you deassociate from a WiFi network, keeping your client active will broadcast a probe request from the saved network list and attempt to join the network if the access point or hotspot sends a probe response to a specific SSID. How should the client proceed with network association if there are several probe responses? In this situation, your client will use preferred network list feature. So let's read more about it in depth below.
Simply explained, a preferred network list is a collection of saved SSIDs (in a specific order) with the settings that you created when connecting them for the first time.
I've seen that users don't remove the SSID from the list, making it an intriguing source of private location information. For example, a specific hotel or cafe will always serve the network with the SSID name assigned to their establishment.
Performing OSINT through PNL is beyond the scope of this post, but I've included a research paper in the resources area below if you're interested.
I'm using a Linux computer right now, and I can use the nmcli utility to query NetworkManager for saved network profiles. As you can see that it is currently connected to the TPS_5GHz network and there are 4 other WiFi networks with the same autoconnect priority of 0.
nmcli -f autoconnect-priority,name,type c
Most WiFi networks have the auto connect setting enabled by default, and very few people try to opt out. So, if the connection is set to autoconnect, connections with higher priority will be preferred. Defaults to 0. The higher number means higher priority.
Let's update the autoconnect priority of the GS_123 network to 10, the highest value in the current list, using the modify command.
nmcli c modify "GS_123" connection.autoconnect-priority 10
I disconnected from the TPS_5GHz network, and guess what, the connection for "GS_123" is now established.
Enough theory; let's get started on the reconnaissance for PNLs in question/answer format. I'll be using AttackDefense's lab and recommend that you try it out once – https://attackdefense.com/challengedetails?cid=1264
I've already discussed how to set the device to monitor mode in previous posts, so I'll skip this one. However, the commands I used are as follows:
How many clients are probing?
Using airodump-ng, you can dump the beacon frames from the access points and probe requests from the station devices.
airodump-ng --band abg wlan0
The display panel will switch when A key is pressed. Continue pressing the key until "display sta only" appears to get the output shown in the screenshot (here you can see in green box).
Answer – 2
What is the Preferred Network List (PNL) length of the client with MAC address 02:00:00:00:02:00?
The scan cannot be filtered by station MAC address. You should look for the station's correspoindin MAC address in the probe request section. As you can see, there are a total of six SSIDs listed in the Probes column.
Answer – 6
The client 02:00:00:00:03:00 connects to which network first if all networks in its PNL are available? Assume that all networks in PNL are WPA2-PSK networks.
There is no WiFi network with the SSID name you can see in the probe requests. Therefore, you are supposed to create WiFi network with the SSIDs probing by the target station mac address.
Hostapd is a user space application that allows you to configure access points and authentication servers. It is simple to configure using a configuration file, and it supports multiple BSS.
Since a single wifi card can support 8 or 16 BSS, we can use it with hostapd to serve both dex-net and dex-network, as shown in the configuration file below.
Run hostapd with the configuration file shown above. You'll notice that "dex-network" attempted to connect to the wlan1_1 BSS first.
Answer – dex-network