Skip to content

Commit c32a887

Browse files
authored
Update README.md
Minor improvements, FAQ shortened.
1 parent 988835c commit c32a887

File tree

1 file changed

+16
-33
lines changed

1 file changed

+16
-33
lines changed

README.md

Lines changed: 16 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -12,25 +12,24 @@ Build your own WiFi jammer with an ESP8266.
1212
- [Disclaimer](#disclaimer)
1313
- [Installation](#installation)
1414
- [How to use it](#how-to-use-it)
15-
- [FAQ and Troubleshooting](#faq-and-troubleshooting)
15+
- [FAQ](#faq)
1616
- [License](#license)
1717
- [Sources and additional links](#sources-and-additional-links)
1818

1919
## Introduction ##
2020

2121
### What it is
2222

23-
Basically it’s a device which performs a [deauth attack](https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack).
23+
Basically it’s a device which performs a [deauth attack](https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack).
2424
You select the clients you want to disconnect from their network and start the attack. As long as the attack is running, the
25-
selected devices are not able to connect to the network.
25+
selected devices are unable to connect to their network.
2626

2727
### How it works
2828

2929
The 802.11 WiFi protocol contains a so called [deauthentication frame](https://mrncciew.com/2014/10/11/802-11-mgmt-deauth-disassociation-frames/). It is used to disconnect clients safely from a wireless
3030
network.
3131

32-
Because they are unencrypted, you just need the mac address of the WiFi router and of the client device which you want to
33-
disconnect from the network. You don’t even have to be in the network or know the password, it’s enough to be in its range.
32+
Because these packets are unencrypted, you just need the mac address of the WiFi router and of the client device which you want to disconnect from the network. You don’t need to be in the network or know the password, it’s enough to be in its range.
3433

3534
### What an ESP8266 is
3635

@@ -76,7 +75,7 @@ It doesn’t matter which board you use, as long as it has an ESP8266 on it.
7675

7776
**5** Type in `esp8266`
7877

79-
**6** Select version `2.0.0` and click on `Install`
78+
**6** Select version `2.0.0` and click on `Install` (**must be version 2.0.0!**)
8079

8180
![screenshot of arduino, selecting the right version](https://raw.githubusercontent.com/spacehuhn/esp8266_deauther/master/screenshots/arduino_screenshot_1.JPG)
8281

@@ -133,7 +132,16 @@ Note: While scanning the ESP8266 will shut down its access point, so you may hav
133132

134133
Happy hacking :)
135134

136-
## FAQ and Troubleshooting
135+
## FAQ
136+
137+
**Could it auto-deauth all APs in the range?**
138+
139+
It definitely could! But I will not implement this 'feature' for ethical and legal reasons.
140+
141+
**Can it sniff handshakes?**
142+
143+
The ESP8266 has a promiscuous mode in which you can sniff nearly all packets, but handshake packets are dropped and there is no other way to get them with the functions provided by the SDK.
144+
Maybe someone will find a way around this barrier but I wasn't able to.
137145

138146
**`espcomm_sync failed` when uploading**
139147

@@ -145,42 +153,17 @@ Which drivers you need depends on the board, most boards use a cp2102, cp2104 or
145153
**AP scan doesn't work**
146154

147155
There is a reported issue with the Internet Explorer: https://github.com/spacehuhn/esp8266_deauther/issues/5
148-
Try out switching the browser or open the website with another device.
149-
150-
**Timeout error**
151-
152-
This can happen if your device (phone, computer... whatever have the website open) looses connection to the pwned WiFi.
153-
When scanning for clients you will lose the connection, this is normal and you have to make sure you reconnect.
154-
After reloading the page everything should be fine.
155-
156-
**No clients found**
157-
158-
The ESP8266 can only find devices which are in its range and sends packets in the selected WiFi network via 2,4 GHz WiFi while the ESP is scanning.
156+
Try out switching the browser or open the website with another device.
159157

160158
**Deauth attack won't work**
161159

162160
If you see 0 pkts/s on the website you have made a mistake. Check if you have followed the the installation steps correctly and that the right SDK installed, it must be version 2.0.0!
163161
If it can send packets but your target don't loose its connection then the WiFi router uses [802.11w](#how-to-protect-against-it) and it's protected against such attacks or they communicate via 5 GHz WiFi, which the ESP8266 doesn't support.
164162

165-
**Could it auto-deauth all APs in the range?**
166-
167-
It definitely could! But I will not implement this 'feature' for ethical and legal reasons.
168-
169-
**Can it sniff handshakes?**
170-
171-
The ESP8266 has a promiscuous mode in which you can sniff nearly all packets, but handshake packets are dropped and there is no other way to get them with the functions provided by the SDK.
172-
Maybe someone will find a way around this barrier but I wasn't able to.
173-
174-
**Could it open a fake AP to grab passwords?**
175-
176-
That's a feature to be implemented as soon as I have time to code it :).
177-
178-
179163

180164
###If you have other questions or problems with the ESP8266 you can also check out the official [community forum](http://www.esp8266.com/).
181165

182166

183-
184167
## License
185168

186169
This project is licensed under the MIT License - see the [license file](LICENSE) file for details

0 commit comments

Comments
 (0)