ESP32 Wifi Jammer | Deauther | Wifi Penetration Tester | Risinek | For Windows

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
caution what you are about to see and learn is strictly for educational purposes only attempting to recreate this method publicly is a punishable crime by law use it under maximum [Music] discretion hi everyone how are you doing I am making this video since my previous video on this topic was difficult for many people to understand I will guide you step by step on how to install and execute the attacks on a network so let's get started today we will be installing the authenticator on a esp32 microcontroller first go to the official GitHub page of renic and download the project zip file the link will be on the description extract the zip file and keep it aside for now to install this script in esp32 we will need to set up few things first we need to install the latest version of python for Windows go to the website here and follow the steps to install it scroll down and download the installer from the official python page proceed to install and don't forget to check this box it's important after installation of python we need to install another tool called esp2 in your command prompt type pip install ESP tool give it some time cuz it will take few seconds to install I I have already installed it so if everything goes well you can type this command to check the version of the ESP tool looks perfect okay we can now proceed to install the de authenticator script on our esp32 connect your esp32 on your windows and check the Comm port to which it is connected to check the fort right click on Windows icon and click on Device Manager it should be under ports if for some reason it is showing an exclamation mark under ports then you will need to install the cp2102 driver I will leave a link in the description and you can download the driver and install it be sure to install the 64-bit if you have 64-bit system note down the com Port as we will need it in the next step now go back to the official renck page and copy this command this command is specifically for Linux environment so we need to tweak it a little to make it work in Windows open the folder where you downloaded the zip file extract the contents and open the folder now you need to open a command prompt inside this folder it is important that the command prompt has this folder's directory path here is a shortcut to do that quickly open the folder containing the extracted files and click once on the navigation pane type CMD there and press enter it's that easy now paste the code that we copied from the GitHub page just copy the code and press right click on the command promp to paste it remember that I said we need to tweak it a little to make this work on Windows just remove this segment that is everything between p and B and replace it with your com port number okay we are all set to upload the script into our esp32 after pressing enter remember to press the boot Button on esp32 in order for it to work it it will take few seconds but you will finally see that it has completed the upload that's it congratulations you have now successfully install the de authenticator on your ESP 32 okay as I promised in the intro that I will show you some realtime examples here are some of them but remember not all of the attacks works as smoothly as it should I have found two methods that work flawlessly every time I execute them you guys can let me know in the comments if you find out other working methods okay let's get started first we need to connect to our ESP 32 to proceed check your Wi-Fi and you will see a newly created Wi-Fi access point called management AP the password is MGMT admin you can find the details on the GitHub page proceed to connect to this access point now open your browser and type this address 192.168.0.1 and press enter you should now see the landing page of our esp32 the first attack that I will execute is the infamous denial of service attack this attack will kick out any actively connected devices on the target Wi-Fi network make sure that you use your own network unlawful use of this is not recommended on the configur ation page you will find two sections first is Select Target and the other is the attack configuration choose your target Wi-Fi from the list you can also refresh the list for newly added Wi-Fi routers next select the type of attack you want to proceed with select the attack type Doss from the list now below that is the attack method select the d off combine all options since that's the most reliable option that I have found the last option is the attack timeout this dictates the duration of the attack I will use 10 seconds for this demonstration but you can feel free to use higher duration note using higher duration will lock out your ESP 32 for that amount of time this happens because we are connected to the access point bya PP 32s on board Wi-Fi chip and when we execute the script it uses the same Wi-Fi chip to attack thereby disconnecting us from the esp32 after the attack duration is over we need to reconnect to the access point of ESP 32 for further attack options hope this clears out the doubts now I will use my phone as the connected device to my router when I attack the Wi-Fi router you will see that my phone is disconnected from the router it will be unusable till the attack duration is over this method will kick out any wireless device that is actively connected to the router this is called the denial of service attack or dos attack the next attack that we will discuss is called the handshake capture this method captures the handshake file between the router and a connected device using this capture file we can possibly crack the password of the router this method is generally used for offline cracking passwords using air crack NG or hashcat with dictionary or word list this script has two options to download the capture file peek app for aircrack NG and hcca PX for hashcat let's get back to our esp32 homepage reconnect to the management AP and click attack now we again choose the victim router from the list after that we need to choose the attack type this time we will use attack type handshake next we choose the method as d o Rogue AP passive I have found this method to work you guys can test the others and let me know this time choose a little more duration since handshake capture Works a bit differently first the connected client of your victim router will be kicked out when it reattempts to connect back esp32 will capture the handshake protocol and dump it in a pcap file that's the general methodology so giving more duration will ensure the capture I will give like 20 seconds but you can give more to ensure the capture capture press attack and wait for it to complete sometimes the peap file is empty it happens when it fails to capture the handshake so if it happens then try raising the duration once the attack is complete reconnect to the management AP and you will find the option to download the pcap file or HC caps file if using hashcat all right guys that will be it for this tutorial I hope I have covered all the doubts that people generally have if I have missed any topic then feel free to let me know in the comments below I will try try my best to help you guys out special thanks to rizen for creating this wonderful script make sure to check his GitHub page to show some support and if you have liked this tutorial then feel free to like And subscribe to my channel you can also show some love and support by buying me a cup of coffee thanks guys for your love and support see you on the next video take care and happy Hunting
Info
Channel: CodexRat
Views: 8,634
Rating: undefined out of 5
Keywords: ESP32 Wifi JAmmer, ESP32 Deauther, Risinek, Wifi HAck, penetration test, pentest, microcontroller
Id: YjekZXoy91Y
Channel Id: undefined
Length: 13min 2sec (782 seconds)
Published: Sat Sep 30 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.