Skip to content

Commit

Permalink
Merge branch 'readmes' into 'master'
Browse files Browse the repository at this point in the history
readmes update

See merge request 2020-dp-wifi-attacks-using-esp32-8266/esp32-wifi-penetration-tool!42
  • Loading branch information
risinek committed Apr 7, 2021
2 parents e84e4a3 + 58b8af7 commit 5d3fe49
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 0 deletions.
10 changes: 10 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,16 @@ Obviously cracking is not part of this project, as ESP32 is not sufficient to cr
<img src="doc/images/soucastky_8b.png" alt="Hw components" width="400">
</p>

## Features
- **PMKID capture**
- **WPA/WPA2 handshake capture** and parsing
- **Deauthentication attacks** using various methods
- **Denial of Service attacks**
- Formatting captured traffic into **PCAP format**
- Parsing captured handshakes into **HCCAPX file** ready to be cracked by Hashcat
- Passive handshake sniffing
- Easily extensible framework for new attacks implementations
- And more...
## Usage
1. Build and flash it onto ESP32 (devkit or module)
1. Power it
Expand Down
3 changes: 3 additions & 0 deletions main/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,5 +36,8 @@ This is demonstrated in the following sequence diagram:
### PMKID capture
To capture PMKID from AP the only thing we have to do is to initiate connection and get first handshake message from AP. If PMKID is available, AP will send it as part of the first handshake message, so it doesn't matter we don't know the credentials.

### Denial of Service
This reuses deauthentication methods from above and just skips handshake capture. It also allows combination of all deauth methods, which makes it more robust against different behaviour of various devices.

## Reference
Doxygen API reference available

0 comments on commit 5d3fe49

Please sign in to comment.