Skip to content

Capture and interpret probe requests with macOS

License

Notifications You must be signed in to change notification settings

dingody/ProbeOSX

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

56 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ProbeOSX

ProbeOSX is a simple tool which allows for Mac users to sniff for probe requests. This allows you to get plain text information like MAC addresses along with those devices previously connected and/or hidden networks.

Here is a video showing how a Linux user may do the same sort of thing using a similar tool to ProbeOSX. The information broadcasted in a probe request could allow an attacker to create an identical, malicious network which could trick your device into connecting to it; therefore allowing all data traffic to your device to unknowingly be routed through the attacker.

Usage

Download with:

git clone https://github.com/Tommrodrigues/ProbeOSX.git

Run from same directory with:

bash ProbeOSX.sh

The script is fairly easy to use, simply run it using the command above to recieve the standart output. Here are some flags you can add if you would like more or less output:

Flag Description
-h Help: Display all availabe flags
-v Verbose: Show ALL probe requests, even those from the same MAC address asking for the same network. Not recommended
-na No analysis: Mutes the analysis feature at the end of a scan
-i <interface> Interface: Manually set Wi-Fi interface (script should normally auto-detect the correct interface)

Here is some example output:

Example

Notes

The script will only run if there is a MAC address lookup table in its directory called mac-vendor.txt. A file is included in the repository so it shouldn't be a problem. However, if you would like to use a custom lookup table, make sure it follows this format:

<VENDORID>	<VENDORNAME>
00000E	Fujitsu
FCE998	Apple, Inc.
...

When you want to stop, simply press control + c.

Interpreting the output

The table below contains a short description of all of the data outputted by the script:

Name Description
Time The time the probe request was sent (in Hours:Minutes:Seconds).
Signal This is the signal strength of the probe request when received by your computer in dBm. The closer the value is to 0, the stronger the signal.
MAC address Address unique to every device with Wi-Fi capability, may be used to fingerprint a device (can be spoofed).
Target Network This is the name (SSID) of network which the device has requested to connect to.
Vendor This is the manufacturer of whichever device has made the request; determined by the first 6 characters of the MAC.

If you have enabled verbose output (-v) or have intercepted multiple probe requests from one MAC address asking for multiple networks and haven't suppressed the analysis with -na, then you will recieve an analysis following the scan which will show the multiple networks that each MAC address has requested.

About

Capture and interpret probe requests with macOS

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%