<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WLC Signature attack detected in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191935#M7374</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We found that this message was received whenever one of our APs could hear a rogue AP that had a hidden SSID.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Feb 2013 01:58:20 GMT</pubDate>
    <dc:creator>thomas03usmcsf</dc:creator>
    <dc:date>2013-02-28T01:58:20Z</dc:date>
    <item>
      <title>WLC Signature attack detected</title>
      <link>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191934#M7373</link>
      <description>&lt;P&gt;Hi, we have a WLC detecting every 15 min this attack for months. What does it mean? maybe a false positive? something to worry about? any workaround? Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IDS 'NULL probe resp 1' Signature attack detected on AP 'AP1' protocol '802.11b/g' on Controller '192.168.128.17'. The Signature description is 'NULL Probe Response - Zero length SSID element', with precedence '2'. The attacker's mac address is '06:xx:xx:xx:xx:xx', channel number is '11', and the number of detections is '1'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; (2 times)&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 06:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191934#M7373</guid>
      <dc:creator>jmprats</dc:creator>
      <dc:date>2021-07-04T06:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: WLC Signature attack detected</title>
      <link>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191935#M7374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We found that this message was received whenever one of our APs could hear a rogue AP that had a hidden SSID.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 01:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191935#M7374</guid>
      <dc:creator>thomas03usmcsf</dc:creator>
      <dc:date>2013-02-28T01:58:20Z</dc:date>
    </item>
    <item>
      <title>WLC Signature attack detected</title>
      <link>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191936#M7375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Thomas or anyone from CISCO,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the official answer from CISCO that this error message is whenever an AP configured to WLAN Controller can hear a rogue AP with a non-broadcast SSID??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the_guardian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 May 2013 09:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191936#M7375</guid>
      <dc:creator>the_guardian</dc:creator>
      <dc:date>2013-05-08T09:17:52Z</dc:date>
    </item>
    <item>
      <title>WLC Signature attack detected</title>
      <link>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191937#M7376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/consolidated/b_cg74_CONSOLIDATED_chapter_01000001.pdf"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/consolidated/b_cg74_CONSOLIDATED_chapter_01000001.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;NULL probe response signatures—During a NULL probe response attack, a hacker sends a NULL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;probe response to a wireless client adapter. As a result, the client adapter locks up. When aNULLprobe&lt;/P&gt;&lt;P&gt;response signature is used to detect such an attack, the access point identifies the wireless client and&lt;/P&gt;&lt;P&gt;alerts the controller. The NULL probe response signatures are as follows:&lt;/P&gt;&lt;P&gt;◦NULL probe resp 1 (precedence 2)&lt;/P&gt;&lt;P&gt;◦NULL probe resp 2 (precedence 3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remove the attacker from the network to avoid client lockup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 May 2013 05:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-signature-attack-detected/m-p/2191937#M7376</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-05-19T05:08:50Z</dc:date>
    </item>
  </channel>
</rss>

