mirror of
https://github.com/SpacehuhnTech/esp8266_deauther.git
synced 2026-04-26 16:25:54 +03:00
[GH-ISSUE #167] Feature Requests #113
Labels
No labels
best of
bug
development
discussion
documentation
duplicate
feature request
help wanted
help wanted
improvement
pinned
pull-request
question
stale
translation
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/esp8266_deauther#113
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @spacehuhn on GitHub (Apr 2, 2017).
Original GitHub issue: https://github.com/SpacehuhnTech/esp8266_deauther/issues/167
Ideas:
improved SSID naming (https://github.com/spacehuhn/esp8266_deauther/issues/158 https://github.com/spacehuhn/esp8266_deauther/issues/137)logging (https://github.com/spacehuhn/esp8266_deauther/issues/130)change MAC adress (https://github.com/spacehuhn/esp8266_deauther/issues/71)add clients manuallyadd settings reset as serial commandadd reset option via pin connectionadd version notice (v.1.2 etc.)fix blank custom SSIDWill not be added:
@Fireflaker commented on GitHub (Apr 3, 2017):
Is it possible to do sniff with ESP32? Probably much harder to program though.
Would it be fun to connect it to a transistor amplifier and run beacon attack + channel hopping so that almost everything running at 2.4G will be satisfied. By that, it becomes an actuall jammer. (Hopefully)
Powerful amps are expensive. You may use output stage on a router or anything with a UHF transistor amplifier.
@spacehuhn commented on GitHub (Apr 3, 2017):
@Fireflaker But that's not what this project is meant for.
@Fireflaker commented on GitHub (Apr 3, 2017):
🌚😈🌚
Stefan Kremser notifications@github.com于2017年4月3日 周一上午11:30写道:
@bildos99 commented on GitHub (Apr 5, 2017):
Implement: arbitrary code execution on the Broadcom Wi-Fi chip
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1046#c2
@ali6836 commented on GitHub (Apr 17, 2017):
Would it be possible to implement adding password(s) to the wifi beacon clone, like in settings have a setting for wifi beacon clone password?
@JEmlay commented on GitHub (Apr 20, 2017):
It would be nice if it could remember the SSID list we create. Or let us create a list in settings then add CUSTOM along side CLEAR/RANDOM/CLONE/ADD
@spacehuhn commented on GitHub (Apr 20, 2017):
@JEmlay
https://twitter.com/spacehuhn/status/841403058378682368
There is a save button at the bottom.
@JEmlay commented on GitHub (Apr 20, 2017):
@spacehuhn - you can sigh all you want but when I power off the unit and turn it back on, no more list.
So maybe find out a little more about the problem instead of firing off the childish memes?
Also, having a list in the settings like I "requested" would allow us to go back and forth between custom list and full random. From what I can tell, even if it did save properly on my unit if I were to blow it out for a full random list then I would have to type in my custom list all over again.
@MAPReiff commented on GitHub (Apr 23, 2017):
@spacehuhn idea - When you do the beacon spam/duplication, can we possibly have any devices that connect to it be taken to an HTML file stored on the device?
@refael613 commented on GitHub (Apr 23, 2017):
Hi,
First of all good work.
Two things:
1)How can I erase this dot before each SSID?
2)How can I change that the SSID show up "Not Secure" (No wifi-key to connect)?
(The fact that the SSID shows up secure people will not try to connect they do not know the key, even there is no AP...)
I have no problems to learn the code but before I wanted to know first if it is possible to do that through the code or it is the hardware to change something...
Thanks in advance
@battletux commented on GitHub (Apr 28, 2017):
Would it be possible to piggy back 2 nodeMCU's in a master/slave config? Where you connect to the Master's web GUI and it relays all scan requests and attacks over serial to the slave which does all the work?
This way it would bypass the whole ap dropping when scanning for clients and allow the web GUI to be a little more responsive.
@tobozo commented on GitHub (Apr 28, 2017):
If you're ready to trade the Wifi web-server part for a Serial web server, see #37
@snipercon55 commented on GitHub (Apr 29, 2017):
would it be possible to intercept the communication between the router and the device to see what people are searching or using the internet for??
@spacehuhn commented on GitHub (Aug 8, 2017):
Since most features are implemented now, I gonna close this issue now.
There isn't much more to add at this point. All important things that are possible with this software and hardware setup were implemented.
@itsik-b commented on GitHub (Jul 5, 2018):
I'm not sure, but I think that on earlier versions you could save an SSID by just clicking on "save" button. can't find it on ver 2.0.6 :/
@itsik-b commented on GitHub (Jul 5, 2018):
on future versions, will the device will be able to connect to a local network and to be controlled locally ?
that way you can control it and don't lose your connection to the world :)
@tobozo commented on GitHub (Jul 5, 2018):
WiFi client has been requested a few times already so there's a probability it'll be implemented in the next version.
@itsik-b commented on GitHub (Jul 5, 2018):
there is an other version that rely on 1.6 ver of this project. Wi-PWN
the wifi client implemented there and works fine, even managed to do wireless upgrade to the esp8266.