esp8266_deauther/web_interface/attack.html

122 lines
4.2 KiB
HTML

<!--- This software is licensed under the MIT License: https://github.com/spacehuhntech/esp8266_deauther -->
<!Doctype html>
<html>
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=0.8, minimal-ui">
<meta name="theme-color" content="#36393E">
<meta name="description" content="ESP8266 Deauther">
<title>ESP8266 Deauther</title>
<link rel="stylesheet" type="text/css" href="style.css">
<script src="js/site.js"></script>
<script src="js/attack.js"></script>
</head>
<body onload="loadLang()">
<nav>
<ul class="menu">
<li><a href="scan.html" data-translate="scan">Scan</a></li>
<li><a href="ssids.html" data-translate="ssids">SSIDs</a></li>
<li><a href="attack.html" data-translate="attacks">Attack</a></li>
<li><a href="settings.html" data-translate="settings">Settings</a></li>
</ul>
</nav>
<div id="status"></div>
<div class="container">
<div class="row">
<div class="col-12">
<h1 class="header" data-translate="attacks">Attacks</h1>
<p>
<span class="red" data-translate="info_span">INFO:</span><br>
<span data-translate="attack_info">
- You might lose connection when starting an attack!<br>
- You need to select a target for the deauth attack.<br>
- You need a saved SSID for the beacon and probe attack.<br>
- Click reload to refresh the packet rate.<br>
</span>
<span data-translate="info_disclaimer">In case of an unexpected error, please reload the site and
look at the serial monitor for further debugging.</span><br>
</p>
<p class="right">
<button onclick="stopAll()" data-translate="stop">stop</button>
<button onclick="load()" data-translate="reload">reload</button>
</p>
<table>
<tr>
<th data-translate="attacks">Attacks</th>
<th data-translate="targets">Targets</th>
<th>Pkts/s</th>
<th data-translate="start_stop">START / STOP</th>
</tr>
<tr>
<td>Deauth</td>
<td id="deauthTargets">0</td>
<td id="deauthPkts">0/0</td>
<td><button id="deauth" onclick="start(0)" class="select" data-translate="start">START</button>
</td>
</tr>
<tr>
<td>Beacon</td>
<td id="beaconTargets">0</td>
<td id="beaconPkts">0/0</td>
<td><button id="beacon" onclick="start(1)" class="select" data-translate="start">START</button>
</td>
</tr>
<tr>
<td>Probe</td>
<td id="probeTargets">0</td>
<td id="probePkts">0/0</td>
<td><button id="probe" onclick="start(2)" class="select" data-translate="start">START</button>
</td>
</tr>
<tr>
<td colspan="2">All Pkts/s:</td>
<td colspan="2" id="allpkts">0</td>
</tr>
</table>
<h2>Deauth</h2>
<p data-translate="deauth_desc">
Closes the connection of WiFi devices by sending deauthentication frames to access points and client
devices you selected.<br>
This is only possible because a lot of devices don't use the 802.11w-2009 standard that offers a
protection against this attack.<br>
Please only select one target! When you select multiple targets that run on different channels and
start the attack,
it will quickly switch between those channels and you have no chance to reconnect to the access
point that hosts this web interface.
</p>
<h2>Beacon</h2>
<p data-translate="beacon_desc">
Beacon packets are used to advertise access points. By continuously sending beacon packets out, it
will look like you created new WiFi networks.<br>
You can specify the network names under SSIDs.<br>
</p>
<h2>Probe</h2>
<p data-translate="probe_desc">
Probe requests are sent by client devices to ask if a known network is nearby.<br>
Use this attack to confuse WiFi trackers by asking for networks that you specified in the SSID
list.<br>
It's unlikely you will see any impact by this attack with your home network.<br>
</p>
</div>
</div>
</div>
<footer>
<span id="version">Version 2.6.1</span>
<br>
<br>
<a href="http://deauther.maltronics.com" target="_blank">Wiki</a> | <a href="info.html">Credits</a>
</footer>
</body>
</html>