This is an old revision of the document!
Wi-Fi attacks refer to various techniques used to exploit vulnerabilities or weaknesses in wireless networks and devices connected to them. Using the ESP32 connected to Flipper Zero I will demonstrate two types of attacks.
Wi-Fi deauthentication is a technique used to disconnect or disrupt the wireless connection between a client device (such as a laptop, smartphone, or tablet) and a Wi-Fi network. It exploits a vulnerability in the Wi-Fi protocol, specifically the 802.11 standard, to send deauthentication frames to the target device. Performing a Wi-Fi deauthentication attack on a targeted access point (AP) involves specifically targeting a single AP for disruption.
The process is as follows:
It's important to note that conducting Wi-Fi deauthentication attacks without proper authorization is illegal and unethical. Deauthentication attacks should only be performed for legitimate purposes, such as network security testing or troubleshooting, with the necessary permissions and within legal boundaries.
This is an inoffensive attack that consists of creating a few Wifi networks that use as SSID the lyrics of the “Never Gonna Give You Up” music.
For This setup the ESP32-WROOM32 development board is used.
Flipper Zero is a versatile, open-source, and hacker-friendly gadget designed for various security and hacking purposes. It combines multiple functions into a single device, offering features such as hardware hacking, radio communication, signal analysis, and more.
Flipper Zero also benefits from GPIO pins that work at 3.3V but also tolerate 5V. The pinout is available below:
The application running on Flipper Zero is Wifi Marauder. This is a C application that is specifically designed to interface with Wifi Dev Board available for Flipper Zero that also is built using ESP32.