ESP8266 Deauther with a Material Design UI and other features. [Based upon spacehuhn/esp8266_deauther].
Try a live demo at https://Wi-PWN.github.io
- Introduction
- Disclaimer
- Installation
- Flashing with NodeMCU-Flasher
- Compiling with Arduino
- How to use it
- FAQ
- License
- Sources and additional links
Basically it’s a device which performs a deauth attack.
You select the clients you want to disconnect from their network and start the attack. As long as the attack is running, the
selected devices are unable to connect to their network.
Other attacks also have been implemented, such as beacon or probe request flooding.
The ESP8266 is a cheap micro controller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino.
You can buy these chips for under $2 from China!
The 802.11 Wi-Fi protocol contains a so called deauthentication frame. It is used to disconnect clients safely from a wireless network.
Because these management packets are unencrypted, you just need the mac address of the Wi-Fi router and of the client device which you want to disconnect from the network. You don’t need to be in the network or know the password, it’s enough to be in its range.
With 802.11w-2009 Wi-Fi got an update to encrypt management frames. So make sure your router is up to date and has management frame protection enabled. But note that your client device needs to support it too, both ends need to have it enabled!
The only problem is that most devices don’t use it. I tested it with different Wi-Fi networks and devices, it worked every time! It seems that even newer devices which support frame protection don’t use it by default.
I made a Deauth Detector using the same chip to indicate if such an attack is running against a nearby network. It doesn't protect you against it, but it can help you figure out if and when an attack is running.
Use it only for testing purposes on your own devices!
Wi-PWN and its contributors don't take any responsibility for what you do with this program.
Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!
Requirements:
- ESP8266 module (any board)
- Micro-USB cable
- Computer
I would recommend getting a USB breakout/developer board, mainly due to the 4Mb of flash and simplicity.
In order to upload the Wi-PWN firmware, you can use one of two methods. The first method is easier overall but using Arduino is better for debugging. YOU ONLY NEED TO DO ONE OF THE INSTALLATION METHODS!
-
Download the current release of Wi-PWN
-
Upload the
.binfile using the nodemcu-flasher. Alternatively you can use the official esptool from espressif. -
Connect your ESP8266 (making sure the drivers are installed) and open up the NodeMCU Flasher
-
Go to the
Advancedtab and select the correct values for your board. -
Navigate to the
configtab and click the gear icon for the first entry. -
Browse for the
.binfile you just downloaded and click open. -
Switch back to the
Operationtab and click Flash(F).
-
Download the source code of this project.
-
Install Arduino and open it.
-
Go to
File>Preferences -
Add
http://arduino.esp8266.com/stable/package_esp8266com_index.jsonto the Additional Boards Manager URLs. (refer to https://github.com/esp8266/Arduino) -
Go to
Tools>Board>Boards Manager -
Type in
esp8266 -
Select version
2.0.0and click onInstall(must be version 2.0.0!)
-
Go to
File>Preferences -
Open the folder path under
More preferences can be edited directly in the file
-
Go to
packages>esp8266>hardware>esp8266>2.0.0>tools>sdk>include -
Open
user_interface.hwith a text editor -
Just before the last line
#endif, add the following:typedef void (*freedom_outside_cb_t)(uint8 status); int wifi_register_send_pkt_freedom_cb(freedom_outside_cb_t cb);
void wifi_unregister_send_pkt_freedom_cb(void); int wifi_send_pkt_freedom(uint8 *buf, int len, bool sys_seq);
-
Go to the arduino/SDK_fix folder of this project
-
Copy
ESP8266Wi-Fi.cppandESP8266Wi-Fi.htoC:\%username%\AppData\Local\Arduino15\packages\esp8266\hardware\esp8266\2.0.0\libraries\ESP8266WiFi\src -
Open
arduino/Wi-PWN/esp8266_deauther.inoin Arduino -
Select your ESP8266 board at
Tools>Boardand the right port atTools>Port
If no port shows up you need to reinstall the drivers, search online for chip part number + 'driver Windows' -
Depending on your board you may have to adjust the
Tools>Board>Flash Frequencyand theTools>Board>Flash Size. I used the80MHzFlash Frequency, and the4M (1M SPIFFS)Flash Size -
Upload! CTRL-U
Note: If you use a 512kb version of the ESP8266, you need to comment out a part of the mac vendor list in data.h
Your ESP8266 Deauther is now ready!
-
Connect your ESP8266 to a USB power source (you can power it with your phone using USB OTG cable)
-
Scan for Wi-Fi networks on your device and connect to
Wi-PWN. The password isrootaccess. -
Once connected, open up your browser and go to
192.168.4.1 -
Click on the Scan to scan for Wi-Fi networks
Note: You may have to reconnect to the Wi-Fi network. -
Select the WiFi network(s) you want to perform the attack on. Once finished, click on the Attack button
Happy hacking :)
Can it sniff handshakes?
The ESP8266 has a promiscuous mode in which you can sniff packets, but handshake packets are dropped and there is no other way to get them with the functions provided by the SDK.
Maybe someone will find a way around this barrier in the future.
espcomm_sync failed/espcomm_open when uploading
The ESP upload tool can't communicate with the chip, make sure the right port is selected!
You can also try out different USB ports and cables.
If this doesn't solve it you may have to install USB drivers.
Which drivers you need depends on the board, most boards use a cp2102 or ch340.
AP scan doesn't work
There is a reported issue on this: https://github.com/spacehuhn/esp8266_deauther/issues/5 Try switching the browser or opening the website with another device.
Deauth attack won't work
If you see 0 pkts/s on the website then you've made a mistake. Check that you have followed the the installation steps correctly and that the right SDK installed, it must be version 2.0.0! If it can send packets but your target doesn't loose its connection, then the Wi-Fi router either uses 802.11w and it's protected against such attacks, or it communicates on the 5GHz band, which the ESP8266 doesn't support because of its 2.4GHz antenna.
If you have other questions or problems with the ESP8266 you can also check out the official community forum.
This project is licensed under the MIT License - see the license file file for details.
The License file must be included in any redistributed version of this program!
Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!
Original project - https://github.com/spacehuhn/esp8266_deauther
Deauth attack: https://en.wikipedia.org/wiki/Wi-Fi-deauthentication-attack
Deauth frame: https://mrncciew.com/2014/10/11/802-11-mgmt-deauth-disassociation-frames/
ESP8266:
Packet Injection with ESP8266:
- http://hackaday.com/2016/01/14/inject-packets-with-an-esp8266/
- http://bbs.espressif.com/viewtopic.php?f=7&t=1357&p=10205&hilit=Wi-Fi_pkt_freedom#p10205
- https://github.com/pulkin/esp8266-injection-example
802.11w-2009: https://en.wikipedia.org/wiki/IEEE_802.11w-2009
Wi-Fi_send_pkt_freedom function limitations: http://esp32.com/viewtopic.php?f=13&t=586&p=2648&hilit=Wi-Fi_send_pkt_freedom#p2648
G o o g l e s e a r c h t e r m s WiPWN, WiPwner, Wi PWN, PWN Wi, Wi PAWN