2021-01-11 18:04:59 +01:00
|
|
|
<!--- This software is licensed under the MIT License: https://github.com/spacehuhntech/esp8266_deauther -->
|
|
|
|
|
2018-03-24 18:15:59 +01:00
|
|
|
<!Doctype html>
|
|
|
|
<html>
|
2021-01-11 18:04:59 +01:00
|
|
|
|
|
|
|
<head>
|
|
|
|
<meta charset="UTF-8">
|
|
|
|
<meta name="viewport" content="width=device-width, initial-scale=0.8, minimal-ui">
|
|
|
|
<meta name="theme-color" content="#36393E">
|
|
|
|
|
|
|
|
<meta name="description" content="ESP8266 Deauther">
|
|
|
|
<title>ESP8266 Deauther</title>
|
|
|
|
|
|
|
|
<link rel="stylesheet" type="text/css" href="style.css">
|
|
|
|
<script src="js/site.js"></script>
|
|
|
|
<script src="js/attack.js"></script>
|
|
|
|
</head>
|
|
|
|
|
|
|
|
<body onload="loadLang()">
|
|
|
|
<nav>
|
|
|
|
<ul class="menu">
|
|
|
|
<li><a href="scan.html" data-translate="scan">Scan</a></li>
|
|
|
|
<li><a href="ssids.html" data-translate="ssids">SSIDs</a></li>
|
|
|
|
<li><a href="attack.html" data-translate="attacks">Attack</a></li>
|
|
|
|
<li><a href="settings.html" data-translate="settings">Settings</a></li>
|
|
|
|
</ul>
|
|
|
|
</nav>
|
|
|
|
|
|
|
|
<div id="status"></div>
|
|
|
|
|
|
|
|
<div class="container">
|
|
|
|
<div class="row">
|
|
|
|
<div class="col-12">
|
|
|
|
<h1 class="header" data-translate="attacks">Attacks</h1>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
<span class="red" data-translate="info_span">INFO:</span><br>
|
|
|
|
<span data-translate="attack_info">
|
2018-03-27 10:32:34 +02:00
|
|
|
- You might lose connection when starting an attack!<br>
|
2018-03-24 18:15:59 +01:00
|
|
|
- You need to select a target for the deauth attack.<br>
|
|
|
|
- You need a saved SSID for the beacon and probe attack.<br>
|
|
|
|
- Click reload to refresh the packet rate.<br>
|
2021-01-11 18:04:59 +01:00
|
|
|
</span>
|
|
|
|
<span data-translate="info_disclaimer">In case of an unexpected error, please reload the site and
|
|
|
|
look at the serial monitor for further debugging.</span><br>
|
|
|
|
</p>
|
2021-01-13 11:57:42 +01:00
|
|
|
<p class="right">
|
|
|
|
<button onclick="stopAll()" data-translate="stop">stop</button>
|
|
|
|
<button onclick="load()" data-translate="reload">reload</button>
|
|
|
|
</p>
|
2021-01-11 18:04:59 +01:00
|
|
|
<table>
|
|
|
|
<tr>
|
|
|
|
<th data-translate="attacks">Attacks</th>
|
|
|
|
<th data-translate="targets">Targets</th>
|
|
|
|
<th>Pkts/s</th>
|
|
|
|
<th data-translate="start_stop">START / STOP</th>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td>Deauth</td>
|
|
|
|
<td id="deauthTargets">0</td>
|
|
|
|
<td id="deauthPkts">0/0</td>
|
|
|
|
<td><button id="deauth" onclick="start(0)" class="select" data-translate="start">START</button>
|
|
|
|
</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td>Beacon</td>
|
|
|
|
<td id="beaconTargets">0</td>
|
|
|
|
<td id="beaconPkts">0/0</td>
|
|
|
|
<td><button id="beacon" onclick="start(1)" class="select" data-translate="start">START</button>
|
|
|
|
</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td>Probe</td>
|
|
|
|
<td id="probeTargets">0</td>
|
|
|
|
<td id="probePkts">0/0</td>
|
|
|
|
<td><button id="probe" onclick="start(2)" class="select" data-translate="start">START</button>
|
|
|
|
</td>
|
|
|
|
</tr>
|
|
|
|
<tr>
|
|
|
|
<td colspan="2">All Pkts/s:</td>
|
|
|
|
<td colspan="2" id="allpkts">0</td>
|
|
|
|
</tr>
|
|
|
|
</table>
|
|
|
|
|
|
|
|
<h2>Deauth</h2>
|
|
|
|
<p data-translate="deauth_desc">
|
|
|
|
Closes the connection of WiFi devices by sending deauthentication frames to access points and client
|
|
|
|
devices you selected.<br>
|
|
|
|
This is only possible because a lot of devices don't use the 802.11w-2009 standard that offers a
|
|
|
|
protection against this attack.<br>
|
|
|
|
Please only select one target! When you select multiple targets that run on different channels and
|
|
|
|
start the attack,
|
|
|
|
it will quickly switch between those channels and you have no chance to reconnect to the access
|
|
|
|
point that hosts this web interface.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<h2>Beacon</h2>
|
|
|
|
<p data-translate="beacon_desc">
|
|
|
|
Beacon packets are used to advertise access points. By continuously sending beacon packets out, it
|
|
|
|
will look like you created new WiFi networks.<br>
|
|
|
|
You can specify the network names under SSIDs.<br>
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<h2>Probe</h2>
|
|
|
|
<p data-translate="probe_desc">
|
|
|
|
Probe requests are sent by client devices to ask if a known network is nearby.<br>
|
|
|
|
Use this attack to confuse WiFi trackers by asking for networks that you specified in the SSID
|
|
|
|
list.<br>
|
|
|
|
It's unlikely you will see any impact by this attack with your home network.<br>
|
|
|
|
</p>
|
2018-03-24 18:15:59 +01:00
|
|
|
</div>
|
|
|
|
</div>
|
2021-01-11 18:04:59 +01:00
|
|
|
</div>
|
|
|
|
<footer>
|
2021-08-21 13:46:01 +02:00
|
|
|
<span id="version">Version 2.6.1</span>
|
2021-01-11 18:04:59 +01:00
|
|
|
<br>
|
|
|
|
<br>
|
|
|
|
<a href="http://deauther.maltronics.com" target="_blank">Wiki</a> | <a href="info.html">Credits</a>
|
|
|
|
</footer>
|
|
|
|
</body>
|
|
|
|
|
|
|
|
</html>
|