An on the go(OTG) Wifi-Manipulator

SwayamInduShashi
2 min readOct 29, 2024

--

Let’s list the IoT devices for the project:-

  1. Node MCU ESP8266
  2. USB-B data cable

Let’s program and flash the chip

Go to the website https://deauther.com/ and do as following:-

  1. Click on ‘Get Started’
  2. Go to ‘Installation’ and read the instructions carefully do understand the process better
  3. Go to ‘Download’ section on the left panel
  4. Choose the .bin file and download it in your chosen location
  5. Go to the website esp.huhn.me
  6. Connect the chip with the wire and click on ‘Connect’
  7. Click on ‘Select’ and select the .bin file
  8. Click on ‘Program’

Once you’ve flashed the .bin file to your ESP8266 Deauther, you can interact with it as follows:

  1. Power On the Device: Connect the ESP8266 to a power source via USB.
  2. Connect to the Deauther WiFi Network:
  • Look for a new WiFi network, usually named something like pwned or deauther.
  • Connect to it using the default password (deauther or as specified in the documentation).

3. Access the Web Interface:

  • Open a web browser and go to 192.168.4.1.
  • This brings up the Deauther’s user interface, where you can scan, select, and interact with networks.

4. Select and Test Networks:

  • Use the interface to analyze WiFi networks, perform tests, and learn about network vulnerabilities.

Here’s an overview of how deauth attacks and multi-host spoofing work in tools like the ESP8266 Deauther:

Deauthentication Attacks

A deauth attack works by sending deauthentication packets to target devices on a WiFi network. These packets instruct devices to disconnect from the network, disrupting their connection. Devices typically reconnect after receiving a deauth packet, but continuous packets prevent stable connectivity. This tactic is primarily used to test the security of WiFi networks.

Multi-host Spoofing

Multi-host spoofing involves broadcasting fake access points (APs) with names identical or similar to existing networks, tricking nearby devices into connecting. This method, often known as an Evil Twin Attack, can reveal how devices react to similarly named networks and helps network administrators assess the resilience of client devices against rogue APs.

Using the ESP8266 Deauther for These Tests

In the Deauther web interface:

  1. Deauth Mode: Select a target network, and deauth specific devices or all connected clients to simulate disconnection attacks.
  2. Multi-AP Spoofing: Under AP mode, create multiple fake APs with custom SSIDs, testing device behavior around these fake networks.

These tests are effective for identifying weak configurations and network vulnerabilities; however, they should only be conducted in a controlled, authorized environment. For more technical details, the ESP8266 Deauther documentation provides additional guidance.

Did you know???

You can make a completely standalone device which doesn’t require any other devices even the mobile phone!!!!

The entire device all with power-source, display, processors and buttons all packed into a tiny box.

Yes !!! Currently perfecting that will update the next time

--

--

SwayamInduShashi
SwayamInduShashi

Written by SwayamInduShashi

I'm a cyber-security enthusiast, student and a hands on experimenter. I'm going to try to test and learn something new and will be documenting my process.

No responses yet