You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+16-33Lines changed: 16 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,25 +12,24 @@ Build your own WiFi jammer with an ESP8266.
12
12
-[Disclaimer](#disclaimer)
13
13
-[Installation](#installation)
14
14
-[How to use it](#how-to-use-it)
15
-
-[FAQ and Troubleshooting](#faq-and-troubleshooting)
15
+
-[FAQ](#faq)
16
16
-[License](#license)
17
17
-[Sources and additional links](#sources-and-additional-links)
18
18
19
19
## Introduction ##
20
20
21
21
### What it is
22
22
23
-
Basically it’s a device which performs a [deauth attack](https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack).
23
+
Basically it’s a device which performs a [deauth attack](https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack).
24
24
You select the clients you want to disconnect from their network and start the attack. As long as the attack is running, the
25
-
selected devices are not able to connect to the network.
25
+
selected devices are unable to connect to their network.
26
26
27
27
### How it works
28
28
29
29
The 802.11 WiFi protocol contains a so called [deauthentication frame](https://mrncciew.com/2014/10/11/802-11-mgmt-deauth-disassociation-frames/). It is used to disconnect clients safely from a wireless
30
30
network.
31
31
32
-
Because they are unencrypted, you just need the mac address of the WiFi router and of the client device which you want to
33
-
disconnect from the network. You don’t even have to be in the network or know the password, it’s enough to be in its range.
32
+
Because these packets are unencrypted, you just need the mac address of the WiFi router and of the client device which you want to disconnect from the network. You don’t need to be in the network or know the password, it’s enough to be in its range.
34
33
35
34
### What an ESP8266 is
36
35
@@ -76,7 +75,7 @@ It doesn’t matter which board you use, as long as it has an ESP8266 on it.
76
75
77
76
**5** Type in `esp8266`
78
77
79
-
**6** Select version `2.0.0` and click on `Install`
78
+
**6** Select version `2.0.0` and click on `Install` (**must be version 2.0.0!**)
80
79
81
80

82
81
@@ -133,7 +132,16 @@ Note: While scanning the ESP8266 will shut down its access point, so you may hav
133
132
134
133
Happy hacking :)
135
134
136
-
## FAQ and Troubleshooting
135
+
## FAQ
136
+
137
+
**Could it auto-deauth all APs in the range?**
138
+
139
+
It definitely could! But I will not implement this 'feature' for ethical and legal reasons.
140
+
141
+
**Can it sniff handshakes?**
142
+
143
+
The ESP8266 has a promiscuous mode in which you can sniff nearly all packets, but handshake packets are dropped and there is no other way to get them with the functions provided by the SDK.
144
+
Maybe someone will find a way around this barrier but I wasn't able to.
137
145
138
146
**`espcomm_sync failed` when uploading**
139
147
@@ -145,42 +153,17 @@ Which drivers you need depends on the board, most boards use a cp2102, cp2104 or
145
153
**AP scan doesn't work**
146
154
147
155
There is a reported issue with the Internet Explorer: https://github.com/spacehuhn/esp8266_deauther/issues/5
148
-
Try out switching the browser or open the website with another device.
149
-
150
-
**Timeout error**
151
-
152
-
This can happen if your device (phone, computer... whatever have the website open) looses connection to the pwned WiFi.
153
-
When scanning for clients you will lose the connection, this is normal and you have to make sure you reconnect.
154
-
After reloading the page everything should be fine.
155
-
156
-
**No clients found**
157
-
158
-
The ESP8266 can only find devices which are in its range and sends packets in the selected WiFi network via 2,4 GHz WiFi while the ESP is scanning.
156
+
Try out switching the browser or open the website with another device.
159
157
160
158
**Deauth attack won't work**
161
159
162
160
If you see 0 pkts/s on the website you have made a mistake. Check if you have followed the the installation steps correctly and that the right SDK installed, it must be version 2.0.0!
163
161
If it can send packets but your target don't loose its connection then the WiFi router uses [802.11w](#how-to-protect-against-it) and it's protected against such attacks or they communicate via 5 GHz WiFi, which the ESP8266 doesn't support.
164
162
165
-
**Could it auto-deauth all APs in the range?**
166
-
167
-
It definitely could! But I will not implement this 'feature' for ethical and legal reasons.
168
-
169
-
**Can it sniff handshakes?**
170
-
171
-
The ESP8266 has a promiscuous mode in which you can sniff nearly all packets, but handshake packets are dropped and there is no other way to get them with the functions provided by the SDK.
172
-
Maybe someone will find a way around this barrier but I wasn't able to.
173
-
174
-
**Could it open a fake AP to grab passwords?**
175
-
176
-
That's a feature to be implemented as soon as I have time to code it :).
177
-
178
-
179
163
180
164
###If you have other questions or problems with the ESP8266 you can also check out the official [community forum](http://www.esp8266.com/).
181
165
182
166
183
-
184
167
## License
185
168
186
169
This project is licensed under the MIT License - see the [license file](LICENSE) file for details
0 commit comments