Beacon Frames

The most-transmitted frame on any Wi-Fi network — and the single richest source of unauthenticated information about a BSS.

Status: drafting Related: 802.11 frame types, Probe Request and PNL, BSSID / SSID / ESS, RSN information element, Power-save / TIM / DTIM


What a beacon contains

An AP broadcasts a beacon every TBTT (Target Beacon Transmission Time) — by default 102.4 ms, i.e. ~10 / second. Every station within range sees every beacon it can demodulate.

Fixed fields:

FieldBytesPurpose
Timestamp8TSF (Timing Synchronization Function), microseconds.
Beacon Interval2TBTTs in TUs (1 TU = 1024 µs).
Capability Information2ESS/IBSS, Privacy bit, Short Preamble, etc.

Information Elements (IEs) follow — variable, advertised by tag number:

TagNameWhat it carries
0SSIDNetwork name (zero-length = “hidden”).
1Supported RatesLegacy rate set.
3DS Parameter SetPrimary channel.
5TIMTraffic Indication Map (which sleeping clients have buffered traffic).
7CountryRegulatory domain + power constraints.
32Power ConstraintTPC base.
35TPC ReportTPC current.
36Channel Switch AnnouncementForthcoming channel change.
42ERP Information802.11g protection.
45HT Capabilities802.11n.
48RSNCipher suites, AKM, MFP capability.
50Extended Supported Rates 
54Mobility Domain802.11r FT.
61HT Operation 
70RM Enabled Capabilities802.11k.
191VHT Capabilities802.11ac.
192VHT Operation 
195Transmit Power Envelope 
255Element ID ExtensionHE / EHT capabilities (Wi-Fi 6/7).
221Vendor SpecificWPA1 IE, WPS IE, Microsoft / Apple / Cisco extensions.

Authentication / encryption settings come from the RSN IE; the underlying generations come from HT/VHT/HE/EHT IEs; the AP’s neighbours come from Reduced Neighbor Report (Wi-Fi 6E+).

What beacons leak

Everything an attacker needs to plan an attack:

  • SSID (or that the SSID is hidden).
  • BSSID (the AP MAC).
  • Cipher / AKM — WPA2-PSK vs WPA3-SAE vs WPA-Enterprise vs Open is in the RSN IE.
  • MFP capability and required-flag — likewise in the RSN IE.
  • Operating channel and bandwidth.
  • Manufacturer fingerprint — vendor-specific IEs frequently include WPS Manufacturer/Model strings, even when WPS is “disabled”.
  • WPS state — locked / unlocked, version, configured.
  • Mobility Domain ID — same MD ID across BSSes means 802.11r FT roaming is possible.
  • BSS Load — current station count, channel utilisation (when 802.11k is enabled).

Hidden SSIDs

A “hidden” beacon has SSID length = 0. The first probe request from any client carries the real SSID, and the AP’s probe response includes it. Hiding offers zero security and breaks Passive Scanning behaviour on some clients.

TIM and DTIM

Beacon’s TIM IE encodes which sleeping (power-save) stations have data waiting. Every Nth beacon is a DTIM (Delivery Traffic Indication Message), which signals upcoming buffered broadcast/multicast traffic. DTIM count is in the TIM IE.

The protocol invariant: a power-saving STA must wake for every DTIM and check the bitmap. This is the substrate the GTK abuse attack rides on — an attacker times broadcast injection to follow a forged DTIM.

Channel Switch Announcement (CSA)

A beacon (or Action frame) can carry a CSA IE that tells stations to switch to a new channel after N more beacons. CSA is unauthenticated even with MFP — that’s the well-known weakness used by rogue AP (herd a target STA to the attacker’s channel) and channel-steering DoS.

Beacon protection (BIGTK / 802.11w-2020)

Wi-Fi 6 introduced Beacon Integrity using the BIGTK. When enabled, the beacon includes a MIC IE; stations verify it with the BIGTK distributed during the 4-way handshake. Adoption is sparse as of 2026; even where AP support exists, clients don’t always validate.

Tooling notes

  • airodump-ng lists every beacon it sees — channel, BSSID, ESSID, AKM, cipher.
  • kismet parses every IE and persists them.
  • tshark -Y wlan.fc.type_subtype==0x08 -V decodes a single beacon in full.
  • bettercap’s ble.recon / wifi.recon does the same with structured output.
  • hcxdumptool strips beacons into a corpus suitable for hashcat PMKID/WPA-handshake cracking.

See also

References

  • IEEE 802.11-2020 §9.3.3.3, §9.4.
  • Wi-Fi Alliance — WPA3 Specification v3.4 — beacon-protection requirements.