SSID
About 4 min read
Last updated: 2026-04-08
What Is SSID
SSID (Service Set Identifier) is the name that identifies a Wi-Fi network. When you open the Wi-Fi settings on your phone or computer, the network names you see are SSIDs.
An SSID is a string of up to 32 bytes, periodically broadcast by the access point (router) in beacon frames. Devices receive these beacons and display available networks.
A single router can host multiple SSIDs. Home routers typically use separate SSIDs for 2.4 GHz and 5 GHz bands, while enterprise environments separate guest and corporate SSIDs for network segmentation.
Stealth SSID - Effectiveness and Limitations
Stealth SSID (disabling SSID broadcast) prevents the network name from appearing in device Wi-Fi lists. While it seems like a security improvement, its actual effectiveness is limited.
- Probe requests expose it: Devices already connected to a hidden SSID constantly send probe requests asking "Is this SSID available?" Attackers can intercept these to identify the SSID.
- Network analysis tools detect it: Tools like Wireshark and Kismet easily reveal hidden SSIDs. Hiding only makes the network harder to see, not invisible.
- Reduced usability: New devices must manually enter the SSID, adding operational friction.
The Wi-Fi Alliance and most security experts do not recommend stealth SSID as a security measure. Strong encryption (WPA3) and complex passwords are far more effective.
Evil Twin Attacks
An Evil Twin attack involves setting up a rogue access point with the same SSID as a legitimate network to trick users into connecting.
- The attacker creates an access point matching a public Wi-Fi SSID (e.g.,
Free_WiFi) with stronger signal strength, causing devices to auto-connect to the fake AP. - All traffic from connected users passes through the attacker, who can intercept unencrypted HTTP communications to steal passwords and credit card numbers.
- Some attacks display fake captive portals prompting users to enter email addresses and passwords.
Defenses include using a VPN on public Wi-Fi, only visiting HTTPS sites, disabling auto-connect, and in enterprise environments, deploying 802.1X authentication with RADIUS servers for certificate-based verification.
Safe SSID Naming Practices
- Avoid personal information: Names like
Tanaka_HomeorRoom301reveal the owner or location to potential attackers. - Change default SSIDs: Factory defaults like
NETGEAR-5G-1234reveal the router manufacturer and model, enabling targeted attacks against known vulnerabilities. - Skip provocative names:
HackMeIfYouCanonly attracts unwanted attention with no benefit. - Distinguish bands when needed:
MyNetwork_2GandMyNetwork_5Ghelp users choose the right band, though modern routers with band steering handle this automatically.
More important than SSID naming is enabling WPA3 (or at minimum WPA2) encryption with a strong, long password. MAC address filtering provides supplementary protection but is easily bypassed through MAC spoofing.
Common Misconceptions
- Hiding the SSID makes Wi-Fi secure
- Hidden SSIDs are easily detected through probe requests from connected devices and network analysis tools. Real security comes from encryption strength and password complexity, not SSID visibility.
- Networks with the same SSID are the same network
- SSID is just a name - multiple access points can share the same SSID. Evil Twin attacks exploit this. A matching SSID does not guarantee you are connected to the legitimate access point.