Skip to content

Janek79ax/esp32-wifi-penetration-tool-esp32c5

 
 

Repository files navigation

Czech5

This project implements active broadcast deauth frames on selected targets on ESP32 C5. Based on https://github.com/risinek/esp32-wifi-penetration-tool

It also provides experimental attacks against the WPA3 routers based on SAE Commit frame. These are based on Mathy Vanhoef work: https://github.com/vanhoefm/dragondrain-and-time

On top of deauthentication, it provides Evil Twin attack with password verification.

Simple attack info is displayed on connected STA7789 1.9" TFT SPI display. Screen connection details:

Screen -> ESP32C5

GND -> GND

VCC -> 3V3

SCL -> 4

SDA -> 23

RES -> 14

DC -> 26

CS -> 25

BLK -> 13

alt text

Deauth Features

  • Up to 10 APs can be attacked with channel switching, just select them on the web page
  • Deauth frame has been fixed so now Active DOS attack works
  • On the other hand, passive and mixed attack mode and handshake and PMKID attacks have been disabled

Evil Twin

This attack requires second board, classical ESP32 flashed with https://github.com/Janek79ax/BW16-ESP32-Evil-Twin/tree/main/EvilTwin_slave

Connection details: ESP32C5 - ESP32

  • 5V - VIN
  • GND - GND
  • 26 - D21
  • 25 - D22

This second board could be connected to SPI 0.96 OLED display as follows: OLED - ESP32:

  • GND - GND
  • VCC - 3V3
  • D0 - D18
  • D1 - D23
  • RES - D16
  • DC - D17
  • CS - D5 This provides ability to read obtained password on the screen.

WPA 3 Features

There are two types of WPA3 attacks. Both generate a random scalar and compute corresponding ECC point in a SAE Commit Frame.

  1. Dragon Drain aims to overload router with elliptic cryptography equations; it sends SAE Commit Frames on behalf of 20 MAC addresses with average of 50 FPS. Most of them should avoid anti-clogging token requests by the router.
  2. Client overflow which sends totally random MACs (using Random Generator). This causes router to respond with 'unable to handle additional associated STAs' and no new clients can connect.

Important: only the second attack (Client overflow) is reliable. The dragon drain seems to slow down my router, sometimes disconnect a device but is never as powerful as original dragon drain which forges 200 frames per second.

WPA 3 details

Typical SAE Commit request: alt text

STA Overflow response: alt text

About

Exploring possibilities of ESP32 platform to attack on nearby Wi-Fi networks.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 97.6%
  • C++ 1.8%
  • Python 0.4%
  • HTML 0.1%
  • Assembly 0.1%
  • CMake 0.0%