![]() ![]() The second approach doesn’t require any modifications to the ESP-IDF. ![]() The first is to bypass the declaration of the blocking function at compile-time, which is borrowed from the esp32-deauther project. To get around this used two different approaches. The closed source WiFi libraries of the ESP-IDF block specific arbitrary frames like deauthentication frames. The main challenge in this project is to implement these attacks while using the ESP-IDF development framework. To demonstrate just how simple this can be, developed the ESP32 Wi-Fi Penetration Tool that runs on cheap dev boards and can execute deauthentication and Denial of Service attacks, and capture handshakes and PMKIDs. Unfortunately, there are several vulnerabilities in the underlying 802.11 standards that could potentially be exploited. WiFi is one of those technologies that most of us would have trouble living without.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |