mirror of
https://github.com/SpacehuhnTech/esp8266_deauther.git
synced 2026-04-26 00:05:55 +03:00
[GH-ISSUE #886] Whole 2.0 version bugged #374
Labels
No labels
best of
bug
development
discussion
documentation
duplicate
feature request
help wanted
help wanted
improvement
pinned
pull-request
question
stale
translation
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/esp8266_deauther#374
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @infectedw on GitHub (Jun 6, 2018).
Original GitHub issue: https://github.com/SpacehuhnTech/esp8266_deauther/issues/886
Well, i followed whole instruction everything installed properly.
But after trying to scan i set channel on all and get error ERROR: timeout loading file run?cmd=scan but sometimes it find some networks after i select channel, but now moving to "Attack" section, when i press "Deauth" it don't do anything it show me ERROR: loading file: attack.json.
Sometimes it won't load WiFi hotspot so i have to couple times turn off and then turn on NodeMCU. Please i would like to someone explain maybe i'm doing something wrong. I wanna fix this soon i need it.
The 1.6 version had better UI and didn't had that much errors... Please back old UI.
EDITED: New ERROR: timeout loading file run?cmd=save names after clicking "Scan APS"
New bug: Scan show SSIDs after selecting SSID deauth don't do anything and beacon also don't do anything
@marek26340 commented on GitHub (Jun 7, 2018):
Yeah, this is quite normal, and I don't know a solution... It happens when you try to attack on a different channel that your ESP is currently (being controlled) at.
I can't currently even try to explain the rest of your problems, but I did not encounter any of these, except that attack.json.
@infectedw commented on GitHub (Jun 7, 2018):
I will make video how it all looks, and post here or somewhere else and set link here. I have tons of errors...
@tobozo commented on GitHub (Jun 7, 2018):
@infectedw commented on GitHub (Jun 7, 2018):
First Video: https://vimeo.com/273944772
Second Video: https://vimeo.com/273945836
I hope you guys see enough!
@tobozo commented on GitHub (Jun 7, 2018):
Video 1: you just hit the back button and your browser gave you some cache but you're not actually connected to the ESP8266
Video 2: same as video 1 but you seem to lose your temper :p
@spacehuhn commented on GitHub (Jun 7, 2018):
*RTFM also includes the text on the web pages itself.
@deantonious commented on GitHub (Jun 8, 2018):
Bonvenon al la EIF. Bonvolu RTFM kaj ekzekutu la komandon "rice" dum sur la seria interfaco por pliaj elpurigado.