An on the go(OTG) Wifi-Manipulator
Let’s list the IoT devices for the project:-
- Node MCU ESP8266
- USB-B data cable
Let’s program and flash the chip
Go to the website https://deauther.com/ and do as following:-
- Click on ‘Get Started’
- Go to ‘Installation’ and read the instructions carefully do understand the process better
- Go to ‘Download’ section on the left panel
- Choose the .bin file and download it in your chosen location
- Go to the website esp.huhn.me
- Connect the chip with the wire and click on ‘Connect’
- Click on ‘Select’ and select the .bin file
- Click on ‘Program’
Once you’ve flashed the .bin file to your ESP8266 Deauther, you can interact with it as follows:
- Power On the Device: Connect the ESP8266 to a power source via USB.
- Connect to the Deauther WiFi Network:
- Look for a new WiFi network, usually named something like
pwned
ordeauther
. - Connect to it using the default password (
deauther
or as specified in the documentation).
3. Access the Web Interface:
- Open a web browser and go to
192.168.4.1
. - This brings up the Deauther’s user interface, where you can scan, select, and interact with networks.
4. Select and Test Networks:
- Use the interface to analyze WiFi networks, perform tests, and learn about network vulnerabilities.
Here’s an overview of how deauth attacks and multi-host spoofing work in tools like the ESP8266 Deauther:
Deauthentication Attacks
A deauth attack works by sending deauthentication packets to target devices on a WiFi network. These packets instruct devices to disconnect from the network, disrupting their connection. Devices typically reconnect after receiving a deauth packet, but continuous packets prevent stable connectivity. This tactic is primarily used to test the security of WiFi networks.
Multi-host Spoofing
Multi-host spoofing involves broadcasting fake access points (APs) with names identical or similar to existing networks, tricking nearby devices into connecting. This method, often known as an Evil Twin Attack, can reveal how devices react to similarly named networks and helps network administrators assess the resilience of client devices against rogue APs.
Using the ESP8266 Deauther for These Tests
In the Deauther web interface:
- Deauth Mode: Select a target network, and deauth specific devices or all connected clients to simulate disconnection attacks.
- Multi-AP Spoofing: Under AP mode, create multiple fake APs with custom SSIDs, testing device behavior around these fake networks.
These tests are effective for identifying weak configurations and network vulnerabilities; however, they should only be conducted in a controlled, authorized environment. For more technical details, the ESP8266 Deauther documentation provides additional guidance.
Did you know???
You can make a completely standalone device which doesn’t require any other devices even the mobile phone!!!!
The entire device all with power-source, display, processors and buttons all packed into a tiny box.
Yes !!! Currently perfecting that will update the next time