How can I do the wireless probe to get user MAC address, signal strength and etc even they not connected to our wireless network or pass by our wireless location.
Are you asking for mac address of computer that is not connected to your network?
Yes the mac address and the signal strength as well.
Ah… I don’t think this is possible.
If a device is not associated with your equipment in anyway (i.e. ap/station association), there is no way you can get any details from the device. This would be a huge security problem I would imagine…
But of course, I think it’s best a guru confirm this ![]()
Is possible I’m looking the function similar like Cisco Meraki, it can tracking user geo-location by using wireless probe. For example your mobile phone will scan any wireless network to connect, before the available wireless network appears on your mobile phone list. Your mobile phone will probe around for any wireless network availability, so if wireless router receives a probe from a mobile phone, the wireless router will usually return their wireless network name, mac address and signal strength between the mobile phone and the wireless router.
And what am going to do, I need our wireless router to probe around the mobile devices and get their MAC address and signal strength.
Scanning is passive action. There is no transmission from client when he does scanning. What probes are you talking about?
Yes there is no transmission from client when he does a scanning but I would like to grab their signal strength and mac address from my wireless router. For example you will get the mac address and signal strength information when user connected to your wireless router. It similar like wireless snooper in Mikrotik but this is in connected environment. In my way I need what ever user had pass by our wireless router I will get their mac address and signal strength information.

Again: if they do not transmit you have no way how to get their mac addresses. Each radio has two parts: transmitter and receiver. They never work at once. When the radio listens, does not transmit.
Try to sit in the middle of the square of foreign city and write a list of the names of the people who went around watching you but said no word. You cannot know their names if they don’t tell you.
What didn’t you catched?
How about using wireless snooper? I’m not able to export the wireless snoop stations records into file.
Its totally possible.
You look in the frame of the wireless packet and you will see MAC addresses. Devices are constantly looking for known SSIDs to connect to and send out Probe requests to determine if those SSIDS are nearby. You can capture those and get the required information.
You can also track associated clients but looking the ACKS that are flying through the air, and find access points by looking at the beacons.
All this data is flying through the air all the time, and is ripe for the picking.
Mikrotik is not the best kit to do this due to the limited API control of the snopper / sniffer ; but look at openWRT has tools to grab this and write it all out to a CSV.
TheWiFiGuy is right, it’s possible using wireless sniffer.
The only “problem” with that solution is that when wireless sniffer is active, radio can’t do anything else, so you need 2 radios if you want to sniff and provide WIFI. But seen the price of Mikrotik gear, you will be anyway far far below cisco prices ![]()
Do you have any link I can refer?
Hey
soundsticks if you got an answer let me know I am also looking for one
Hi,
any news on that?
best regards
andreas
Try this… the resultant file "sniffer.cap"can be viewed in Wireshark and shows mac and signal strength. I couldn’t set the duration of the test (interval only allows up to 5 seconds) so some trial and error required.
[admin@test] /interface wireless sniffer> sniff wlan1
append as-value do file interval once without-paging
[admin@test] /interface wireless sniffer> sniff wlan1 do=
processed-packets: 1529
file-size: 10204
file-saved-packets: 39
file-over-limit-packets: 1490
memory-size: 10198
memory-saved-packets: 34
memory-over-limit-packets: 1495
real-file-limit: 10
real-memory-limit: 10
[admin@test] /interface wireless sniffer> packet print file=sniffer.cap
Try this… the resultant file “sniffer.cap” can be viewed in Wireshark and shows mac and signal strength. I couldn’t set the duration of the test (interval only allows up to 5 seconds) so some trial and error required.
[admin@test] /interface wireless sniffer> sniff wlan1
append as-value do file interval once without-paging
[admin@test] /interface wireless sniffer> sniff wlan1 do=
processed-packets: 1529
file-size: 10204
file-saved-packets: 39
file-over-limit-packets: 1490
memory-size: 10198
memory-saved-packets: 34
memory-over-limit-packets: 1495
real-file-limit: 10
real-memory-limit: 10[admin@test] /interface wireless sniffer> packet print file=sniffer.cap