Computer techologies

Gasi the wave! Select and configure the hardware deauthenticator Wi-Fi on ESP8266

The contents of the article

  • How the “jamming” works
  • The versions of the Dstike devices
  • Deauther 2.0 installation
  • Loading .bin
  • Downloading via Arduino IDE
  • Features and settings overview
  • Commands for serial control
  • Wi-PWN
  • A couple of words about the protection of

A Wi-Fi jammer, or a Wi-Fi jamming device, is a gadget designed to disconnect wireless devices from You can imagine yourself as a friendly rally (a neighbor, of course, will be delighted when you tear off his pornographic or, for example, a football match at the most interesting place), and criminal use: an attacker can disconnect from the network security cameras or other important equipment. In this article, we will examine what are the low-cost options for hardware deauthenticators, how to use them, and how to protect themselves from such attacks.

How does the “jammer” work

Unlike real jammers that interrupt the radio transmitter signal with their stronger signal, the deauthenticator works at the software level. It implements a denial-of-service attack by sending a deauthentication frame to the router on behalf of devices connected to the network. Since this frame is not encrypted in any way, it is enough for the jammer to find out the MAC addresses of the devices after capturing traffic on the network.

Deauthentication is usually part of a complex attack on the network. It is used to create an “evil double” of the access point or to intercept the handshake, which then allows you to decrypt the password. However, a jammer can be useful in itself.

WARNING

All of the considered tips are highly recommended to be used only for educational purposes. The blocking of data transmission and the use of the means considered may be prosecuted. To conduct penetration tests, you must obtain the appropriate written confirmation from the customer. Remember that the deauthorization data is stored in the router logs.

Recently, inexpensive and miniature boards with support for the NodeMCU software platform have become very popular. They are built on the ESP8266 module, which implements the work with Wi-Fi according to the standard 802.11b / g / n on the frequency 2.4 GHz . Now there are two variants of such boards: with the chip CP2102 of the American company Silicon Labs or with the Chinese CH340.

 NodeMCU versions
NodeMCU versions

These boards are positioned as prototyping devices: on their basis the craftsmen create automated systems controlled by Wi-Fi. The topic itself is quite exciting, but we are now interested in another thing – the possibility of using NodeMCU for attacking.

For full monitoring and injection of packages, the ESP8266 is not usable due to technical limitations, but it can be used as a deauthenticator – which led to the appearance of appropriate firmware. Last year, a good person with the alias Spacehuhn unveiled the first of them, but since then other versions have appeared – with additional features.

INFO

If you choose more serious equipment for warrioring – with a monitoring mode and maybe even the ability to conduct MiTM attacks on the network – then check out the our last year’s FAQ on the choice of tools for working with wireless networks.

I will demonstrate the process on the example of the motherboard of the Chinese manufacturer Dstike: it is ESP8266 and there are modes of operation as a client (P2P) and access points (soft-AP). The board can be operated from a smartphone or any other device with Wi-Fi.

I note that the functionality of the software does not depend on either the chip or the board – you can choose any option at your discretion. Dstike products alone have several options in different versions and for use in different situations. All of them share one thing – the ability to jam the network.

Varieties of Dstike devices

Deauther Wristband – bracelet with built-in display, battery and switch. Convenient device for quick access to the control panel.

 Portable Jammer

Portable Jammer
Deauther Power Bank – with a modified controller charge; The control is carried out through a special panel. The controller has a connector for connecting an external antenna. Batteries are not included. This is an inconspicuous device that can be easily left anywhere and used remotely.

 Power bank

Power bank

 The charge controller

The charge controller
Deauther OLED V3.5 – in this version you will additionally receive a connector for connecting an external antenna and a battery holder for 18650 mA · h. The device is controlled by means of buttons and a switch, and the output comes to the screen, which allows using this option without additional equipment.

 The finished jammer with the screen

The finished jammer with the screen
The main advantage of these gadgets is in the choice of a certain network or all at once in the range of the device. I note just in case that for the attacks, the password from Wi-Fi is not required! 🙂

Installing Deauther 2.0

Let’s start with Deauther 2.0 – the same firmware that Spacehuhn developed. In its repository on GitHub, you can choose the version for the particular board.

Files with the bin extension are compiled skits. They need to be installed on the board via a special bootloader. But if you want, then in archives with the source code you will find libraries and sketches that can be delivered through the Arduino IDE.