Skip to content

Commit

Permalink
Release 2.5.1
Browse files Browse the repository at this point in the history
Requires updating both the 32u4 sketch and the ESP sketch.

Add a serial link to allow issuing commands from the 32u4 back to the ESP8266, this may be utilized more in future releases.

Add the ability to set an open network via serial for devices that have trouble connecting to a secured ESP8266 access point (rare cases).  This makes it easier for the new users who experience this rare issue to get started using their device.
  • Loading branch information
exploitagency committed Sep 25, 2017
1 parent 3cb769a commit 2744493
Show file tree
Hide file tree
Showing 6 changed files with 24 additions and 9 deletions.
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,6 +97,8 @@ Connect to the Access Point with the SSID "Exploit" with a password of "DotAgenc
Open a web browser pointed to "http://192.168.1.1"
The default administration username is "admin" and password "hacktheplanet".

NOTE: Certain devices seem to have trouble connecting to a password protected ESP8266 access point. The symptoms of this involve repeatedly being prompted to enter the password and being unable to connect to the ESP8266 via WiFi. This can be solved by following the above instructions but instead issuing the command "ResetDefaultConfig:OpenNetwork" via serial. The device will be restored to the factory defaults(with the exception of now being an unsecured network). The device will reboot and you may now connect to it as an unsecured WiFi access point with an SSID of "Exploit". You should now be able to establish a connection.

-----
Configure ESPloit
-----
Expand Down
10 changes: 4 additions & 6 deletions source/Arduino_32u4_Code/Arduino_32u4_Code.ino
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@
//Prints debug lines via serial if set to 1
//const int debug=0;

String version = "2.1";
String version = "2.2";

//Used later for determining if we are ready to release a key press or a combination of key presses
int keypressdone=0;
Expand All @@ -65,11 +65,9 @@ void setup() {
void loop() {
// while (SOFTserial.available()) {
while (Serial.available()) {
String cmd1 = Serial.readStringUntil(':');
if(cmd1 == "ResetDefaultConfig"){
Serial1.println("ResetDefaultConfig:");
Serial.println("Resetting configuration files back to default settings.");
}
String serial_link = Serial.readStringUntil('\n');
Serial1.println(serial_link);
Serial.println("Relaying command to connected ESP device.");
}
while (Serial1.available()) {
// String cmd = SOFTserial.readStringUntil(':');
Expand Down
15 changes: 14 additions & 1 deletion source/ESP_Code/ESP_Code.ino
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,7 @@ int DelayLength;
int livepayloaddelay;
int autopwn;
char autopayload[64];
int open_network=0;

void runpayload() {
File f = SPIFFS.open(autopayload, "r");
Expand Down Expand Up @@ -361,7 +362,12 @@ bool loadDefaults() {
json["version"] = version;
json["accesspointmode"] = "1";
json["ssid"] = "Exploit";
json["password"] = "DotAgency";
if(open_network==0){
json["password"] = "DotAgency";
}
else if(open_network==1){
json["password"] = "";
}
json["channel"] = "6";
json["hidden"] = "0";
json["local_IP"] = "192.168.1.1";
Expand Down Expand Up @@ -1103,6 +1109,13 @@ void loop() {
while (Serial.available()) {
String cmd = Serial.readStringUntil(':');
if(cmd == "ResetDefaultConfig"){
String RSDC = Serial.readStringUntil('\n');
if(RSDC.indexOf("OpenNetwork") >=0) {
open_network=1;
}
else {
open_network=0;
}
loadDefaults();
ESP.restart();
}
Expand Down
Binary file modified source/ESP_Code/ESP_Code.ino.generic.bin
Binary file not shown.
2 changes: 2 additions & 0 deletions source/ESP_Code/HelpText.h
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,8 @@ Connect to the Access Point with the SSID "Exploit" with a password of "DotAgenc
Open a web browser pointed to "http://192.168.1.1"<br>
The default administration username is "admin" and password "hacktheplanet".<br>
<br>
NOTE: Certain devices seem to have trouble connecting to a password protected ESP8266 access point. The symptoms of this involve repeatedly being prompted to enter the password and being unable to connect to the ESP8266 via WiFi. This can be solved by following the above instructions but instead issuing the command "ResetDefaultConfig:OpenNetwork" via serial. The device will be restored to the factory defaults(with the exception of now being an unsecured network). The device will reboot and you may now connect to it as an unsecured WiFi access point with an SSID of "Exploit". You should now be able to establish a connection.<br>
<br>
-----<br>
Configure ESPloit<br>
-----<br>
Expand Down
4 changes: 2 additions & 2 deletions source/ESP_Code/version.h
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
String version = "2.5.0";
String latestardversion = "2.1";
String version = "2.5.1";
String latestardversion = "2.2";

0 comments on commit 2744493

Please sign in to comment.