ProbeOSX is a simple tool which allows for Mac users to sniff for probe requests. This allows you to get plain text information like MAC addresses along with those devices previously connected and/or hidden networks.
Here is a video showing how a Linux user may do the same sort of thing using a similar tool to ProbeOSX. The information broadcasted in a probe request could allow an attacker to create an identical, malicious network which could trick your device into connecting to it; therefore allowing all data traffic to your device to unknowingly be routed through the attacker.
Download with:
git clone https://github.com/Tommrodrigues/ProbeOSX.git
Run from same directory with:
bash ProbeOSX.sh
The script is fairly easy to use, simply run it using the command above to recieve the standart output. Here are some flags you can add if you would like more or less output:
Flag | Description |
---|---|
-h |
Help: Display all availabe flags |
-v |
Verbose: Show ALL probe requests, even those from the same MAC address asking for the same network. Not recommended |
-na |
No analysis: Mutes the analysis feature at the end of a scan |
-i <interface> |
Interface: Manually set Wi-Fi interface (script should normally auto-detect the correct interface) |
Here is some example output:
The script will only run if there is a MAC address lookup table in its directory called mac-vendor.txt
. A file is included in the repository so it shouldn't be a problem. However, if you would like to use a custom lookup table, make sure it follows this format:
<VENDORID> <VENDORNAME>
00000E Fujitsu
FCE998 Apple, Inc.
...
When you want to stop, simply press control
+ c
.
The table below contains a short description of all of the data outputted by the script:
Name | Description |
---|---|
Time |
The time the probe request was sent (in Hours:Minutes:Seconds). |
Signal |
This is the signal strength of the probe request when received by your computer in dBm. The closer the value is to 0, the stronger the signal. |
MAC address |
Address unique to every device with Wi-Fi capability, may be used to fingerprint a device (can be spoofed). |
Target Network |
This is the name (SSID) of network which the device has requested to connect to. |
Vendor |
This is the manufacturer of whichever device has made the request; determined by the first 6 characters of the MAC. |
If you have enabled verbose output (-v
) or have intercepted multiple probe requests from one MAC address asking for multiple networks and haven't suppressed the analysis with -na
, then you will recieve an analysis following the scan which will show the multiple networks that each MAC address has requested.