Yes the mac address and the signal strength as well.Are you asking for mac address of computer that is not connected to your network?
Is possible I'm looking the function similar like Cisco Meraki, it can tracking user geo-location by using wireless probe. For example your mobile phone will scan any wireless network to connect, before the available wireless network appears on your mobile phone list. Your mobile phone will probe around for any wireless network availability, so if wireless router receives a probe from a mobile phone, the wireless router will usually return their wireless network name, mac address and signal strength between the mobile phone and the wireless router.Ah... I don't think this is possible.
If a device is not associated with your equipment in anyway (i.e. ap/station association), there is no way you can get any details from the device. This would be a huge security problem I would imagine...
But of course, I think it's best a guru confirm this
Yes there is no transmission from client when he does a scanning but I would like to grab their signal strength and mac address from my wireless router. For example you will get the mac address and signal strength information when user connected to your wireless router. It similar like wireless snooper in Mikrotik but this is in connected environment. In my way I need what ever user had pass by our wireless router I will get their mac address and signal strength information.Scanning is passive action. There is no transmission from client when he does scanning. What probes are you talking about?
Do you have any link I can refer?@Jarda
Its totally possible.
You look in the frame of the wireless packet and you will see MAC addresses. Devices are constantly looking for known SSIDs to connect to and send out Probe requests to determine if those SSIDS are nearby. You can capture those and get the required information.
You can also track associated clients but looking the ACKS that are flying through the air, and find access points by looking at the beacons.
All this data is flying through the air all the time, and is ripe for the picking.
Mikrotik is not the best kit to do this due to the limited API control of the snopper / sniffer ; but look at openWRT has tools to grab this and write it all out to a CSV.
HeyDo you have any link I can refer?@Jarda
Its totally possible.
You look in the frame of the wireless packet and you will see MAC addresses. Devices are constantly looking for known SSIDs to connect to and send out Probe requests to determine if those SSIDS are nearby. You can capture those and get the required information.
You can also track associated clients but looking the ACKS that are flying through the air, and find access points by looking at the beacons.
All this data is flying through the air all the time, and is ripe for the picking.
Mikrotik is not the best kit to do this due to the limited API control of the snopper / sniffer ; but look at openWRT has tools to grab this and write it all out to a CSV.
Try this.... the resultant file "sniffer.cap" can be viewed in Wireshark and shows mac and signal strength. I couldn't set the duration of the test (interval only allows up to 5 seconds) so some trial and error required.
[admin@test] /interface wireless sniffer> sniff wlan1
append as-value do file interval once without-paging
[admin@test] /interface wireless sniffer> sniff wlan1 do=
processed-packets: 1529
file-size: 10204
file-saved-packets: 39
file-over-limit-packets: 1490
memory-size: 10198
memory-saved-packets: 34
memory-over-limit-packets: 1495
real-file-limit: 10
real-memory-limit: 10
[admin@test] /interface wireless sniffer> packet print file=sniffer.cap