Wifi Deauther

WiFi deauthentication attack using ESP8266

esp8266 great project was created by spacehuhn. All credits go to him! I just bought things and built it to test my network and devices if they are vulnerable to this attack. And yes my FritzBox was vulnerable.

On this page I will describe how to build such a device.

What is it all about?

This device and software is able to start the so called deauth attacks on wifi enabled networks. So the general problem with this attack is, that it’s part of IEEE 802.11 standard. These deauth packets are meant to be sent by the access point to inform the client (e.g. your PC or mobile device) that it is disconnected from the network. And so the device will disconnect from its side and cleanup stuff.

But what happens, if the above device (ESP8266 deauther) is sending such packets? Yes, your device will disconnect as well and reconnect and disconnect again …

So your network is unusable as long as the attack is running. And it could be the base to try other vulnerabilities afterwards.

How can you protect yourself?

As always, update your devices! Devices that have 802.11w-2009 encrypts management (and deauthentication) frames.

Building this thing

Getting parts

Assemble parts

I think there is no need to describe this in more detail.

Firmware install (Optional)

As the deauther from tindie is already flashed with a current version, you don’t need to do this. If you want to update your firmware later, then better follow the authors description here.

Have fun!