logo elektroda
logo elektroda
X
logo elektroda

Wi-Fi Jammer ( deauthentication attack )

jarusek131 36558 19
ADVERTISEMENT
Treść została przetłumaczona polish » english Zobacz oryginalną wersję tematu
  • Wi-Fi Jammer ( deauthentication attack )
    For some time now, I became interested in network security and came across an article on how to make a Wi-Fi Jammer (deauthentication attack). I did not even suspect that you can make someone's life so easy and simple. To make a Jammer All we need is esp8266. The principle of operation is very simple. Our device pretends to be a router and sends information (deauthentication packets) to network users to disconnect. This option does not always work, but it is enough to set an attack on a specific device and you're done. I haven't been able to find information on how to defend myself against such an attack, but maybe one of the forum members knows and will share their knowledge. Remember that you can only use this for educational purposes and testing your OWN network. Link to the video with step-by-step instruction youtube.com/watch?v=9UgFafZhONI

    Instruction:

    Uploading the program to ESP8266:

    1) Download the file with the files forbiddenbit.com/239/
    2) Unpack the Wi -Fi_Jammer.zip file
    3) Install the driver for CH340 ch341SER / SETUP.EXE
    4) Open ESP8266Flasher.exe.
    Select deauther_2.1.0_1m.bin in the file.
    In Operation, select the COM port from ESP8266 and click FLASH.

    Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack )
    ATTACK:

    1) Connect to wpnet, password: deauther
    2) Open the address of the browser entry 192.168.4.1
    3) Accept the terms
    4) Select your network from the list
    5) Go to the attack tab, select deauth and click start. Now the devices connected to the network will be disconnected.
    If you select an attack beacon, multiple networks will be created
    Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack ) Wi-Fi Jammer ( deauthentication attack )

    instructables.com/id/Wi-Fi-Jammer-With-ESP8266/

    Cool? Ranking DIY
    About Author
    jarusek131
    Level 9  
    Offline 
    jarusek131 wrote 5 posts with rating 41. Live in city Warszawa. Been with us since 2016 year.
  • ADVERTISEMENT
  • #2 18022417
    krisRaba
    Level 31  
    Interesting. If I understand correctly from the cursory information, the device copies the MAC of the indicated router and to the selected target (network client), impersonating the router, sends frames defined in the standard, which are used to force the client to disconnect from the router. An interesting method for a local attack that makes life difficult for someone. All in all, if the frame is defined in the standard, the customer should necessarily handle it, and thus it is difficult to defend against it.
  • #3 18022448
    tygrysss
    Level 21  
    I remember the Gargoyle CC probably was susceptible to this and the FritxBox not, but it actually shows how easy it is to disconnect someone.
  • #4 18022545
    fotomh-s
    Level 24  
    jarusek131 wrote:
    Jammer to do

    I am asking my colleague to respect the correct technical terminology. The device does not qualify as a jammer. It is enough for us that there is already a sufficiently large number of people who call the igniter, the RC apparatus a remote control, there are also those who say that "they turn on the electricity" :-P
    I advise you to read: https://hackaday.com/2017/08/13/wifi-deauthentication-vs-wifi-jamming-what-is-the-difference/

    As for the possibilities of defense, it is:
    Quote:
    There is hope though with 802.11w which encrypts management frames. It's been around for a while however manufacturers don't seem bothered and don't implement it, even though it would improve the security of a WiFi device from these types of attacks.
  • ADVERTISEMENT
  • #5 18022612
    wiktor13570
    Level 12  
    I was making a similar jammer with the Wemos d1 mini. Newer, more decent routers are more resistant to this type of action, and not all of them can be disrupted
  • #6 18022940
    jarusek131
    Level 9  
    If you choose to attack the entire network it rarely works, but if you choose one device from the network it always worked in MY case, I checked on 3 laptops, 2 TVs and 5 phones and it fired every time.
  • #7 18023065
    Anonymous
    Level 1  
  • ADVERTISEMENT
  • #9 18023352
    leonow32
    Level 30  
    If someone has a free evening, he can make a simple program that will allow anonymous use of the Internet for free - just make a loop on ESP that activates WPS every minute, put a tile by the window and just wait for a neighbor to press the WPS button on his router ;) then you just need to write down the SSID together with the EEPROM password :D
  • #10 18023889
    oshii
    Level 26  
    Then finally
    leonow32 wrote:
    it is enough to make a loop on ESP that activates WPS every minute

    if:
    leonow32 wrote:
    wait for a neighbor to press the WPS button on their router

    ?

    You host two types of attack - bruteforce and regular occasion listening.
    In the first case, most devices block WPS after 2-3 failed pin bend attempts, so it will take some time to check 5,000-11,000 combinations.
    In the latter case, the opportunity may never come.

    The fact is that it's better not to use WPS and turn it off at all.
  • #11 18023992
    leonow32
    Level 30  
    WPS on ESP only works for a minute (or maybe two, I don't remember) and if it doesn't find any router, it turns itself off. This loop is for the WPS to be active all the time and waiting for an opportunity. It has nothing to do with any brute force.
  • #12 18024084
    oshii
    Level 26  
    Still do not understand.
    Or Still you are listening for WPS frames, or you are actively attacking WPS.

    What do you mean by "turn on WPS for a minute"?
  • #13 18024251
    krisRaba
    Level 31  
    oshii wrote:
    Still do not understand.
    Either you are constantly listening for WPS-related frames, or you are actively attacking WPS.

    What do you mean by "turn on WPS for a minute"?

    Normal WPS pairing seems to work by clicking WPS on your router, running WPS in the client and without giving anything (weak passwords etc) they will find, exchange the keys and "pair". Hence, if you run WPS connection in a client over and over again, then you wait for the moment when someone in your router clicks WPS to connect your client. Then you count on the fact that you will shoot the moment between activation on the router and activation in the client, i.e. you will be the first to hit the router ...
    After this pairing, the router reliably turns off WPS.
    A moderately aware user will say that something has gone wrong and turn on WPS again to try again with your client, while you are glad that you already have the authorization data for that router in memory and can use them for free connections over someone else's network. ..
  • #14 18024282
    oshii
    Level 26  
    krisRaba wrote:
    Normal WPS pairing seems to work by clicking WPS on your router, running WPS in the client and without giving anything (weak passwords etc) they will find, exchange the keys and "pair".

    "Normal" WPS pairing requires a PIN printed on the AP.

    Inventions that don't require a pin work like this:
    Quote:
    Push button method:

    In which the user has to push a button, either an actual or virtual one, on both the access point and the new wireless client device. On most devices, this discovery mode turns itself off as soon as a connection is established or after a delay (typically 2 minutes or less)

    https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup#Modes

    So the 2 minutes between consecutive attempts to catch the net stink of failure 90% of the time.

    Anyway, great amenity ...
  • #15 18024354
    krisRaba
    Level 31  
    I have not met the version with the pin, but maybe I just had such equipment in my hands.

    The given description of the version without the pin is consistent with what I wrote earlier. The percentage of success is quite high, because instinctively, everyone clicks the router first, and then goes to encourage the client to cooperate, and since the attacker has WPS turned on in his client all the time (with minor breaks for reconnection), there is a chance to shoot between manual actions user-casualties are large.
    The downside here is another thing - how often do you pair your devices with the router? Because I have a set of devices that are connected once (not via WPS :P ) and I haven't added new ones for a long time :P
    Unless you have to play with this WPS every time you want to connect, which I sincerely doubt, because then the attack does not make much sense, because the acquired keys would not work with the next connection. So I assume that it is done once per device, which is veeeeery rarely :)
  • #16 18024860
    byrrt
    Level 21  
    WPS with PIN? What is the point of that? Digital TV via internet in Orange works in such a way that their devices cannot be paired differently .. There is simply no other option than via WPS ..
  • ADVERTISEMENT
  • #17 18025177
    oshii
    Level 26  
    byrrt wrote:
    WPS with PIN? What is the point of that?

    When configuring, you only enter 8 numbers, while WPA-Passphrase can be set to several dozen alphanumeric characters.

    As for Orange - there is really no option to manually set a password? Imho absurd if that's true.
  • #18 18025228
    a666mi
    Level 10  
    I use wifi zone wps love it for the ease of hacking (internet access and routers) The neighbors are surprised when it shows passwords and turns off wps
  • #19 18025276
    Gandalf102
    Level 6  
    I also had a jammer. My router was quite resilient, but the jammer slowed the internet down terribly.
  • #20 18027542
    uzi18
    Level 24  
    OpenWRT / LEDE has been configuring the option to detect this attack for some time, the only thing is an attack targeting network clients, not a router and basically a standard used for a malicious purpose.

Topic summary

The discussion revolves around the creation and implications of a Wi-Fi Jammer utilizing the ESP8266 microcontroller to execute deauthentication attacks. Participants explain how the device impersonates a router by sending deauthentication packets to disconnect specific network clients. While some routers, like Gargoyle CC, are noted to be vulnerable, others, such as FritzBox, show resilience against such attacks. The conversation also touches on the technical terminology distinction between jamming and deauthentication, with suggestions for defense mechanisms against these attacks, including the use of detection tools on ESP8266. Additionally, there are mentions of WPS vulnerabilities and the ease of exploiting them for unauthorized access to networks. Overall, the discussion emphasizes the educational purpose of such techniques and the importance of securing one's own network.
Summary generated by the language model.
ADVERTISEMENT