mirror of
https://github.com/SpacehuhnTech/esp8266_deauther.git
synced 2026-04-26 16:25:54 +03:00
[GH-ISSUE #673] Deauth attack is seen as working but has no effect #235
Labels
No labels
best of
bug
development
discussion
documentation
duplicate
feature request
help wanted
help wanted
improvement
pinned
pull-request
question
stale
translation
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/esp8266_deauther#235
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ztufenkjian on GitHub (Dec 8, 2017).
Original GitHub issue: https://github.com/SpacehuhnTech/esp8266_deauther/issues/673
Hardware/Flashing:
Board: ?ESP8266 dev module?Tindie OLED?Wemos Mini?Other (specify)?
Using OLED: No
Using WebServer: ?No
Using Serial: No
Installation mode: Flashing via micro-usb
Code/binary version: ?1.6
Flash size: 1MB
Flash method: Esptool
Flash Frequency: 80Mhz
Upload Speed: 230400
Powered by: USB
Description:
Hello,
The webpage states that it is sending out packets at 10pkts/s but there seems to be no issue with the selected network whatsoever. I am using a Google OnHub as my access point that is connected to a modem. I have tried attacking the OnHub and modem individually and both at once, but the same problem occurs. It seems like the device thinks it is attacking the network but there is simply no sign of interference. I am able to use the other two attacks with no problem. They go out very quickly. I have tried restarting the device, network, and reflashing it as well. I have also tried increasing and decreasing the number of packets being sent out to no avail.
What you're expecting: A working Deauth attack with packets that actually have an effect on the network.
What you get instead: A Deauth attack that visually says it is working but has no effect on the network targeted.
You'll have to forgive me if I am missing something entirely or misstated something. I am new to this community and had this device referred to me by a friend.
@tobozo commented on GitHub (Dec 8, 2017):
Google WiFi has 5 GHz wireless 802.11a/n/ac, you're only forcing your devices to switch band/freq and get out of attack range.
This is normal behaviour for a non-vulnerable device, congratulations!