This project has been tested with ESP-IDF 4.4.In a web browser navigate to 192.168.4.1 and you should see a web client to configure and control tool that looks like this:.SSID: ManagementAP and the password: mgmtadmin The management AP will be started automatically after boot.If you're using a Flipper Zero Wifi Dev board this is done VIA the GPIO of the Flipper Zero Power the ESP32 module and press the Reset button.Build and Flash the project onto an ESP32 (DevKit or module).Management AP for easy configuration on the go using smartphone for example.Easily extensible framework for new attacks implementations.Parsing captured handshakes into HCCAPX file ready to be cracked by Hashcat.Formatting captured traffic into PCAP format.Deauthentication attacks using various methods.The rest can be done on a small, cheap, low-power SoC. Obviously cracking is not part of this project, as the ESP32 is not sufficient to crack hashes in effective way. It also includes Wi-Fi attacks itself like capturing PMKIDs from handshakes, or handshakes themselves by different methods like starting rogue duplicated AP or sending deauthentication frames directly, etc. It provides some common functionality that is commonly used in Wi-Fi attacks and makes implementing new attacks a bit simpler. This project introduces a universal tool for the ESP32 platform for implementing various Wi-Fi attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |