Evil modification: TPYBoard makes cheap WIFI jammers and tpyboardwifi
Reprint Please note: @ small Wuyi http://www.cnblogs.com/xiaowuyi
0X01 Introduction
Do you want to have a Wi-Fi jamming device? I collected some information on the Internet and found that esp8266 can be used to implement simple interference functions, including network disconnection, replication, and spoofing. I have a Tpyboard V202 (30 yuan) in my hand, which is also an esp8266 chip. I also want to change the firmware. Can this be done? Try it on weekends.
0X02 build a Development Environment
1. Download an open-source firmware that uses esp8266 to create a Deauth wireless attack. It is developed by arduino.
Github: https://github.com/PakchoiFood/ESP8266_deauther
It contains the arduino ide(arduino-1.8.2-windows.exe(and the fixed source code (esp8266_deauther-master.rar ). In addition, the esp8266development kit (arduino15.rar) can be downloaded from the following link: http://pan.baidu.com/s/1bpnJMkn.
2. decompress the package.
32.16double-click arduino-1.8.2-windows.exe to install arduino IDE. (Skip this step if you have installed arduino IDE ).
4. After the installation is complete, open arduino, find file-> preference from the menu, and click the red area to enter the SDK directory. My path is: C: \ Users \ Administrator \ AppData \ Local \ Arduino15
Decompress the arduino15.rar file downloaded from the Network Disk and overwrite the file in C: \ Users \ Administrator \ AppData \ Local \ Arduino15.
0X03 hardware device preparation
Connect the tpyboard V202 to the computer, find the tool in the arduino IDE menu-> the Development Board, find it in the menu on the right, find a TPYBoard v202 and click to select.
0X04 compile and burn the firmware
1, extract esp8266_deauther-master.rar, arduino IDE menu bar file-open the esp8266_deauther-master source package esp8266_deauther \ esp8266_deauther.ino
2. TPYBoard v202 uses the micro USB data cable to connect to the computer. View the port of the usb conversion string installed. Open the Device Manager on your computer (here is COM11 ).
3. Select the tool-> port and COM11 (based on your actual port number)
4. In the green icon menu area under the menu bar, Select Upload, start compilation, and burn the firmware.
5. view the bottom log area
Wait until the compilation is complete. When the information (Status: changed to "Upload") appears, press and hold the FLASH and press RST to release it, so that TPYBoard v202 can be reset and then press FLASH, when the following information appears, you can release the FLASH button.
When the firmware is burned, the small blue LED on the board will flash fast.
After the writing is completed, the light blue LEDs on the board will stop flashing.
0X05 test attack effect
1. After the firmware is successfully burned, the hotspot named TPYBoard v202 will be found when wireless is enabled. The password is connected by tpyboard by default.
2. After the connection is successful, open the browser and enter 192.168.4.1. Click [I have read and understood the above notice] (this experiment is only used for testing the experiment, please use it with caution ).
The original web page is in English. For ease of use, I simply translated the page (the wifi SSID and password have been modified) and the downloaded compressed package also contains the original English version.
3. After you click in, first scan the nearby wifi. Click [scan].
4. Next, let's select a wifi to test the attack. To make it easy to test whether the attack is successful, select the wifi that is frequently used, and select boda in my list.
5. Click [attack] In the top menu bar to go to the attack page.
6. There are three attack methods: Deauther, Beacon, and Probe-Request. At the bottom of the page is an introduction to these three methods. The Probe-Request does not know how to translate them.
7. In this case, we use Deauther to block client connection and click [START] to START the attack.
8. Find a mobile phone and perform an experiment to see if boda can be connected.
If this is the first connection, it will remain on the interface that is being connected and cannot be connected successfully.
If the connection is established, it will be forced to be disconnected.
9. Click [STOP] to STOP the attack. After it is stopped, the mobile phone is successfully connected to boda.
In the end, esp8266_deauther also includes other attack methods such as wifi replication.
[Disclaimer]
Do not use TPYboard for illegal attacks. Such attacks are considered illegal. The author shall not assume any responsibility for any adverse consequences caused by this software. Please use it with caution.