Skip to content

ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)

License

Notifications You must be signed in to change notification settings

benben4567/esp8266_deauther

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ESP8266 Deauther

Deauthentication attack and other hacks using an ESP8266.

esp8266 deauther with a smartphone

Donate

Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!

I disabled the issue section because of the flood of invalid questions, unrelated to this project.
All necessary information is described below. Do not open issues about this project on any other of my projects, otherwise you will be blocked immediately!

This project is a proof of concept for testing and education.
Neither the ESP8266, nor the SDK was meant and build for such purposes.
Bugs can occur!

Contents

Introduction

What it is

Basically it’s a device which performs a deauth attack.
You select the clients you want to disconnect from their network and start the attack. As long as the attack is running, the selected devices are unable to connect to their network.
Other attacks also have been implemented, such as beacon or probe request flooding.

How it works

The 802.11 Wi-Fi protocol contains a so called deauthentication frame. It is used to disconnect clients safely from a wireless network.

Because these management packets are unencrypted, you just need the mac address of the Wi-Fi router and of the client device which you want to disconnect from the network. You don’t need to be in the network or know the password, it’s enough to be in its range.

What an ESP8266 is

The ESP8266 is a cheap micro controller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino.

You can buy these chips for under $2 from China!

How to protect against it

With 802.11w-2009 Wi-Fi got an update to encrypt management frames. So make sure your router is up to date and has management frame protection enabled. But note that your client device needs to support it too, both ends need to have it enabled!

The only problem is that most devices don’t use it. I tested it with different Wi-Fi networks and devices, it worked every time! It seems that even newer devices which support frame protection don’t use it by default.

I made a Deauth Detector using the same chip to indicate if such an attack is running against a nearby network. It doesn't protect you against it, but it can help you figure out if and when an attack is running.

Disclaimer

Use it only for testing purposes on your own devices!
I don't take any responsibility for what you do with this program.

Please check the legal regulations in your country before using it.
It is not a frequency jammer as claimed falsely by many people. Its attack, how it works and how to protect against it is described above. It uses valid Wi-Fi frames described in the official 802.11 standard and doesn't block or disrupt any other communications or frequencies.

Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!

My intention with this project is to draw more attention to this issue.
This attack shows how vulnerable the 802.11 Wi-Fi standard is and that it has to be fixed.
A solution is already there, why don’t we use it?

Videos

Cheap Wi-Fi 'Jammer' Device | NodeMCU

Wifi 'Jammer' Device V1.1 | Setup Tutorial

WiFi Jamming Tutorial "Deauthing Made Simple"

NodeMCU ESP8266 Tutorial 02: WiFi Hack with ESP8266 (NodeMCU WiFi Jammer)

Installation

The only thing you will need is a computer and an ESP8266.

I recommend you to buy a USB breakout/developer board, because they have 4Mb flash and are very simple to use. It doesn’t matter which board you use, as long as it has an ESP8266 on it.

You have 2 choices here. Uploading the bin files is easier but not as good for debugging, so keep that in mind in case you want to open an new issue. YOU ONLY NEED TO DO ONE OF THE INSTALLATION METHODS!

Uploading the bin files

Note: the 512kb version won't have the full MAC vendor list.
The NodeMCU and every other board which uses the ESP-12 has 4mb flash on it.

0 Download the current release from here

1 Upload using the ESP8266 flash tool of your choice. I recommend using the nodemcu-flasher. If this doesn't work you can also use the official esptool from espressif.

That's all! :)

Make sure you select the right com-port, the right upload size of your ESP8266 and the right bin file.

If flashing the bin files with a flash tool is not working, try flashing the esp8266 with the Arduino IDE as shown below.

Compiling the source with Arduino

0 Download the source code of this project.

1 Install Arduino and open it.

2 Go to File > Preferences

3 Add http://arduino.esp8266.com/stable/package_esp8266com_index.json to the Additional Boards Manager URLs. (source: https://github.com/esp8266/Arduino)

4 Go to Tools > Board > Boards Manager

5 Type in esp8266

6 Select version 2.0.0 and click on Install (must be version 2.0.0!)

screenshot of arduino, selecting the right version

7 Go to File > Preferences

8 Open the folder path under More preferences can be edited directly in the file

screenshot of arduino, opening folder path

9 Go to packages > esp8266 > hardware > esp8266 > 2.0.0 > tools > sdk > include

10 Open user_interface.h with a text editor

11 Scroll down and before #endif add following lines:

typedef void (*freedom_outside_cb_t)(uint8 status);
int wifi_register_send_pkt_freedom_cb(freedom_outside_cb_t cb);
void wifi_unregister_send_pkt_freedom_cb(void);
int wifi_send_pkt_freedom(uint8 *buf, int len, bool sys_seq);

screenshot of notepad, copy paste the right code

don't forget to save!

12 Go to the SDK_fix folder of this project

13 Copy ESP8266Wi-Fi.cpp and ESP8266Wi-Fi.h

14 Paste these files here packages > esp8266 > hardware > esp8266 > 2.0.0 > libraries > ESP8266WiFi > src

15 Open esp8266_deauther > esp8266_deauther.ino in Arduino

16 Select your ESP8266 board at Tools > Board and the right port at Tools > Port
If no port shows up you may have to reinstall the drivers.

17 Depending on your board you may have to adjust the Tools > Board > Flash Frequency and the Tools > Board > Flash Size. In my case i had to use a 80MHz Flash Frequency, and a 4M (1M SPIFFS) Flash Size

18 Upload!

Note: If you use a 512kb version of the ESP8266, you need to comment out a part of the mac vendor list in data.h.

Your ESP8266 Deauther is now ready!

Adding OLED display

image of the esp8266 deauther with an OLED and three buttons

0 Follow the steps above to get your Arduino environment ready.

1 Install this OLED driver library: https://github.com/squix78/esp8266-oled-ssd1306

2 Customize the code for your wiring.
In esp8266_deauther.ino uncomment #define USE_DISPLAY.
Then scroll down and customize these lines depending on your setup.
I used a Wemos d1 mini with a SSD1306 128x64 OLED and 3 push buttons.

	  //include the library you need
	  #include "SSD1306.h"
	  //#include "SH1106.h"

	  //button pins
	  #define upBtn D6
	  #define downBtn D7
	  #define selectBtn D5

	  #define buttonDelay 180 //delay in ms
	  
	  //render settings
	  #define fontSize 8
	  #define rowsPerSite 8

	  //create display(Adr, SDA-pin, SCL-pin)
	  SSD1306 display(0x3c, D2, D1);
	  //SH1106 display(0x3c, D2, D1);

How to use it

First start your ESP8266 by giving it power.

You can use your smartphone if you have a USB OTG cable. esp8266 deauther with a smartphone

Scan for Wi-Fi networks and connect to pwned. The password is deauther.
Once connected, you can open up your browser and go to 192.168.4.1.

You can now scan for networks... webinterface AP scanner

scan for client devices... webinterface client scanner

Note: While scanning the ESP8266 will shut down its access point, so you may have to go to your settings and reconnect to the Wi-Fi network manually.

...and start different attacks. webinterface attack menu

Happy hacking :)

Captive Portal Usage

You need to change the SSID and channel as same as victims Wi-Fi. For load the saved credentials type any address/readit For changing the captive portal page go to data.h and change value of fakePage.

FAQ

Could it auto-deauth all APs in the range?

Yes, but I will not implement this 'feature' for ethical and legal reasons.

Can it sniff handshakes?

The ESP8266 has a promiscuous mode in which you can sniff packets, but handshake packets are dropped and there is no other way to get them with the functions provided by the SDK.
Maybe someone will find a way around this barrier in the future.

espcomm_sync failed/espcomm_open when uploading

The ESP upload tool can't communicate with the chip, make sure the right port is selected!
You can also try out different USB ports and cables.
If this doesn't solve it, you may have to install USB drivers.
Which drivers you need depends on the board, most boards use a cp2102 or ch340.

AP scan doesn't work

There is a reported issue on this: SpacehuhnTech#5
Try switching the browser or opening the website with another device.

Deauth attack won't work

If you see 0 pkts/s on the website, then you've made a mistake. Check that you have followed the installation steps correctly and that the right SDK is installed, it must be version 2.0.0! If it can send packets but your target doesn't loose its connection, then the Wi-Fi router either uses 802.11w and it's protected against such attacks, or it communicates on the 5GHz band, which the ESP8266 doesn't support because of its 2.4GHz antenna.

If you have other questions or problems with the ESP8266, you can also check out the official community forum.

License

This project is licensed under the MIT License - see the license file for details.

The License file must be included in any redistributed version of this program!
Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!

Sources and additional links

deauth attack: https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack

deauth frame: https://mrncciew.com/2014/10/11/802-11-mgmt-deauth-disassociation-frames/

ESP8266:

packet injection with ESP8266:

802.11w-2009: https://en.wikipedia.org/wiki/IEEE_802.11w-2009

Wi-Fi_send_pkt_freedom function limitations: http://esp32.com/viewtopic.php?f=13&t=586&p=2648&hilit=Wi-Fi_send_pkt_freedom#p2648

About

ESP8266 deauther with basic phishing captive portal (AKA evil twin attack)

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C++ 96.6%
  • Other 3.4%