Hello everyone, the software I introduced below is the edited version of Stefan Kremser. Due to legal problems in some countries, Stefan Kremser has limited the ability of Esp8266 (it will stop the attack after some time, no matter how you try to install it).
I have edited so that it can work forever and added auto-attack feature to all neighboring Wi-Fi networks. You can flash this software yourself into any ESP8266.
- Binary firmware: https://drive.google.com/open?id=1TgzcCni4o3MGaQWcwsBswvHeVyqKLNMf
- ESP8266Flasher: https://drive.google.com/open?id=1UwGewADO4X6AeM6BV4jOqQ1cSWfW9zr6
If you want to support the development of this project, you can buy one of the official boards (ESP07) by DSTIKE (Travis Lin) on following sites:
- Scan for WiFi networks.
- Connect to
pwnedwith the password
- Open 192.168.4.1
Once you opened the web interface, you should see this warning page.
Please read the disclaimer carefully before going on by clicking the button below.
Here you can start scanning for access points (WiFi networks) and Stations (Client devices).
Usually you want to start by scanning for access points first and see how much networks are around you.
Please note that the scan takes a few seconds (usually 2 - 5 seconds). You should see a LED going on when starting the scan. When it goes off, the scan is done and you can hit Reload to load the scan results.
Now you can go through the list and select the networks you want to attack.
Here you can add, edit and remove SSIDs. These SSIDs are used for the beacon and probe attack.
Here is where you actually start attacking WiFi devices. Now keep in mind that when starting an attack, you can loose the connection to the web interface! But if you only select one target, you should be able to reconnect to it without problems.
Like on the scan page, it is important that you manually click Reload. This is made on purpose to save ressources and help the stability of the web server.
Edit the settings you like to change, click Save and Reload to confirm your changes were applied.
This project is Deauthentication Attack, It is not a Wifi Jammer.
It uses valid Wi-Fi frames described in the IEEE 802.11 standard and doesn't block or disrupt any frequencies.
The deauthentication attack shows how vulnerable the 802.11 Wi-Fi standard is and that it has to be fixed.
In 2009 the WiFi Alliance actually fixed the problem (see 802.11w), but only a few companies implemented it into their devices and software.To effectively prevent a deauthentication attack, both client and access point must support the 802.11w standard with protected managment frames (PMF).While most client devices seem to support it when the access point forces it, basically no WiFi access point has it enabled.
A solution is already there, why don't we use it?
This project is meant to draw more attention on this issue.