Deauthentication attack and other hacks using an ESP8266.
Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!
I disabled the issue section because of the flood of invalid questions, unrelated to this project.
All necessary information is described below. Do not open issues about this project on any other of my projects, otherwise you will be blocked immediately!
This project is a proof of concept for testing and education.
Neither the ESP8266, nor the SDK was meant and build for such purposes.
Bugs can occur!
Basically it’s a device which performs a deauth attack.
You select the clients you want to disconnect from their network and start the attack. As long as the attack is running, the
selected devices are unable to connect to their network.
Other attacks also have been implemented, such as beacon or probe request flooding.
The 802.11 Wi-Fi protocol contains a so called deauthentication frame. It is used to disconnect clients safely from a wireless network.
Because these management packets are unencrypted, you just need the mac address of the Wi-Fi router and of the client device which you want to disconnect from the network. You don’t need to be in the network or know the password, it’s enough to be in its range.
The ESP8266 is a cheap micro controller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino.
You can buy these chips for under $2 from China!
With 802.11w-2009 Wi-Fi got an update to encrypt management frames. So make sure your router is up to date and has management frame protection enabled. But note that your client device needs to support it too, both ends need to have it enabled!
The only problem is that most devices don’t use it. I tested it with different Wi-Fi networks and devices, it worked every time! It seems that even newer devices which support frame protection don’t use it by default.
I made a Deauth Detector using the same chip to indicate if such an attack is running against a nearby network. It doesn't protect you against it, but it can help you figure out if and when an attack is running.
Use it only for testing purposes on your own devices!
I don't take any responsibility for what you do with this program.
Please check the legal regulations in your country before using it.
It is not a frequency jammer as claimed falsely by many people. Its attack, how it works and how to protect against it is described above. It uses valid Wi-Fi frames described in the official 802.11 standard and doesn't block or disrupt any other communications or frequencies.
Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!
My intention with this project is to draw more attention to this issue.
This attack shows how vulnerable the 802.11 Wi-Fi standard is and that it has to be fixed.
A solution is already there, why don’t we use it?
The only thing you will need is a computer and an ESP8266.
I recommend you to buy a USB breakout/developer board, because they have 4Mb flash and are very simple to use. It doesn’t matter which board you use, as long as it has an ESP8266 on it.
You have 2 choices here. Uploading the bin files is easier but not as good for debugging, so keep that in mind in case you want to open an new issue. YOU ONLY NEED TO DO ONE OF THE INSTALLATION METHODS!
Note: the 512kb version won't have the full MAC vendor list.
The NodeMCU and every other board which uses the ESP-12 has 4mb flash on it.
0 Download the current release from here
1 Upload using the ESP8266 flash tool of your choice. I recommend using the nodemcu-flasher. If this doesn't work you can also use the official esptool from espressif.
That's all! :)
Make sure you select the right com-port, the right upload size of your ESP8266 and the right bin file.
If flashing the bin files with a flash tool is not working, try flashing the esp8266 with the Arduino IDE as shown below.
0 Download the source code of this project.
1 Install Arduino and open it.
2 Go to File
> Preferences
3 Add http://arduino.esp8266.com/stable/package_esp8266com_index.json
to the Additional Boards Manager URLs. (source: https://github.com/esp8266/Arduino)
4 Go to Tools
> Board
> Boards Manager
5 Type in esp8266
6 Select version 2.0.0
and click on Install
(must be version 2.0.0!)
7 Go to File
> Preferences
8 Open the folder path under More preferences can be edited directly in the file
9 Go to packages
> esp8266
> hardware
> esp8266
> 2.0.0
> tools
> sdk
> include
10 Open user_interface.h
with a text editor
11 Scroll down and before #endif
add following lines:
typedef void (*freedom_outside_cb_t)(uint8 status);
int wifi_register_send_pkt_freedom_cb(freedom_outside_cb_t cb);
void wifi_unregister_send_pkt_freedom_cb(void);
int wifi_send_pkt_freedom(uint8 *buf, int len, bool sys_seq);
don't forget to save!
12 Go to the SDK_fix folder of this project
13 Copy ESP8266Wi-Fi.cpp and ESP8266Wi-Fi.h
14 Paste these files here packages
> esp8266
> hardware
> esp8266
> 2.0.0
> libraries
> ESP8266WiFi
> src
15 Open esp8266_deauther
> esp8266_deauther.ino
in Arduino
16 Select your ESP8266 board at Tools
> Board
and the right port at Tools
> Port
If no port shows up you may have to reinstall the drivers.
17 Depending on your board you may have to adjust the Tools
> Board
> Flash Frequency
and the Tools
> Board
> Flash Size
. In my case i had to use a 80MHz
Flash Frequency, and a 4M (1M SPIFFS)
Flash Size
18 Upload!
Note: If you use a 512kb version of the ESP8266, you need to comment out a part of the mac vendor list in data.h.
Your ESP8266 Deauther is now ready!
0 Follow the steps above to get your Arduino environment ready.
1 Install this OLED driver library: https://github.com/squix78/esp8266-oled-ssd1306
2 Customize the code for your wiring.
In esp8266_deauther.ino
uncomment #define USE_DISPLAY
.
Then scroll down and customize these lines depending on your setup.
I used a Wemos d1 mini with a SSD1306 128x64 OLED and 3 push buttons.
//include the library you need
#include "SSD1306.h"
//#include "SH1106.h"
//button pins
#define upBtn D6
#define downBtn D7
#define selectBtn D5
#define buttonDelay 180 //delay in ms
//render settings
#define fontSize 8
#define rowsPerSite 8
//create display(Adr, SDA-pin, SCL-pin)
SSD1306 display(0x3c, D2, D1);
//SH1106 display(0x3c, D2, D1);
First start your ESP8266 by giving it power.
You can use your smartphone if you have a USB OTG cable.
Scan for Wi-Fi networks and connect to pwned
. The password is deauther
.
Once connected, you can open up your browser and go to 192.168.4.1
.
You can now scan for networks...
Note: While scanning the ESP8266 will shut down its access point, so you may have to go to your settings and reconnect to the Wi-Fi network manually.
...and start different attacks.
Happy hacking :)
You need to change the SSID and channel as same as victims Wi-Fi. For load the saved credentials type any address/readit For changing the captive portal page go to data.h and change value of fakePage.
Could it auto-deauth all APs in the range?
Yes, but I will not implement this 'feature' for ethical and legal reasons.
Can it sniff handshakes?
The ESP8266 has a promiscuous mode in which you can sniff packets, but handshake packets are dropped and there is no other way to get them with the functions provided by the SDK.
Maybe someone will find a way around this barrier in the future.
espcomm_sync failed/espcomm_open when uploading
The ESP upload tool can't communicate with the chip, make sure the right port is selected!
You can also try out different USB ports and cables.
If this doesn't solve it, you may have to install USB drivers.
Which drivers you need depends on the board, most boards use a cp2102 or ch340.
AP scan doesn't work
There is a reported issue on this: SpacehuhnTech#5
Try switching the browser or opening the website with another device.
Deauth attack won't work
If you see 0 pkts/s on the website, then you've made a mistake. Check that you have followed the installation steps correctly and that the right SDK is installed, it must be version 2.0.0! If it can send packets but your target doesn't loose its connection, then the Wi-Fi router either uses 802.11w and it's protected against such attacks, or it communicates on the 5GHz band, which the ESP8266 doesn't support because of its 2.4GHz antenna.
If you have other questions or problems with the ESP8266, you can also check out the official community forum.
This project is licensed under the MIT License - see the license file for details.
The License file must be included in any redistributed version of this program!
Any redistributing, advertising or selling of this project as "jammer" without clearly stating it as a pentesting device for testing purposes only, is prohibited!
deauth attack: https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack
deauth frame: https://mrncciew.com/2014/10/11/802-11-mgmt-deauth-disassociation-frames/
ESP8266:
packet injection with ESP8266:
- http://hackaday.com/2016/01/14/inject-packets-with-an-esp8266/
- http://bbs.espressif.com/viewtopic.php?f=7&t=1357&p=10205&hilit=Wi-Fi_pkt_freedom#p10205
- https://github.com/pulkin/esp8266-injection-example
802.11w-2009: https://en.wikipedia.org/wiki/IEEE_802.11w-2009
Wi-Fi_send_pkt_freedom function limitations: http://esp32.com/viewtopic.php?f=13&t=586&p=2648&hilit=Wi-Fi_send_pkt_freedom#p2648