Open kiki67100 opened 8 years ago
Hi!
I added "whitelist" code, with some modifications. You only have to enter MAC of your device(s), not AP. System should not kick you. But I do not have hardware to check new code. It would be nice if you can check it and give me response!
Thanks!
Hello
Thanks for your quick reply i test your code it seems no work because because the friendly_device_found it avoid deauth another station i initiate the friendly_device_found just after loop not the global and it seems works.
In my case i prefer avoid to deauth AP so a modify the code to switch preprocessor variable to switch AP/STATION mode
http://pastebin.com/KrrdUaER http://pastebin.com/KrrdUaER
Have a niceday
— Kevin Muller
Le 25 août 2016 à 11:39, RandDruid notifications@github.com a écrit :
Hi!
I added "whitelist" code, with some modifications. You only have to enter MAC of your device(s), not AP. System should not kick you. But I do not have hardware to check new code. It would be nice if you can check it and give me response!
Thanks!
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/RandDruid/esp8266-deauth/issues/6#issuecomment-242331854, or mute the thread https://github.com/notifications/unsubscribe-auth/AAsFFgz0D6N284-p5E3Fkr_uZFuqOgh9ks5qjWLPgaJpZM4JsztK.
Yes, you right, my mistake, forgot to reset flag. Fixed.
I test your new code with the reset flag.. but now all the stations gets whitelisted ? even if I remove any station or AP at the line 21 //#define WHITELIST_STATION
any idea why?
Hello Alco. I think it's because of typo in check_whitelist function. I created new branch "testing" where I fix it. It would be nice if you test it and give me response. Unfortunately I disassembled my device for another project, and I can't test it myself now.
Line 21 should be a single #define WHITELIST_STATION
without any MAC addresses. It should change how white list is interpreted. To disable white list, set WHITELIST_LENGTH to 0 and define empty list.
Hi, it's fixed with this typo. works like it should. although I can't see much trouble on connections even if I set the attacked AP on a stationary channel mode (and jamm that with this sketch).
The only reliable way to understand your station is sending De-Auth or not is to monitor it with another Wi-Fi adapter on this channel. And analyze with Wireshark. Preferably on Linux, I am not sure about Windows. Also you should take into account positions of your station, AP and target. Maybe target simply do not receive your packets because of weak signal. Amount of De-Auth packets received by target per time interval is also important. This project makes scanning and jamming on the same module, and this results in big delays in jamming for one target. Some network adapters may reconnect so fast that target browser works almost normal. That's why I made 2 module build.
@RandDruid where to put to those codes man ?? In the adruino which line shall I paste the codes ? Can you explain deeply?
I am new to such. I only know c programming. I am learning python
@alco28 hey man, where to paste those codes man ? Which line of deuth master ?
Can you write down process please so I can flash in mcu esp8266?
@SansarSah please take a look at this article https://hackaday.io/project/9333-weekend-on-the-dark-side May be you should start with more simple examples for esp8266.
Thank you. I am nowhere near to . XD. I only know c programming. I am a civil engineering student not a software related engineering student.
On Fri, Jun 10, 2022, 7:10 PM RandDruid @.***> wrote:
@SansarSah https://github.com/SansarSah please take a look at this article https://hackaday.io/project/9333-weekend-on-the-dark-side May be you should start with more simple examples for esp8266.
— Reply to this email directly, view it on GitHub https://github.com/RandDruid/esp8266-deauth/issues/6#issuecomment-1152358283, or unsubscribe https://github.com/notifications/unsubscribe-auth/AZSDCC5CH6V36MROLOF7ZSTVOM62XANCNFSM4CNTHNFA . You are receiving this because you were mentioned.Message ID: @.***>
@RandDruid with kindness, please guide us the way.
I have flashed esp8266 deuth 1.5 version in my mcu board.
On Fri, Jun 10, 2022, 7:10 PM RandDruid @.***> wrote:
@SansarSah https://github.com/SansarSah please take a look at this article https://hackaday.io/project/9333-weekend-on-the-dark-side May be you should start with more simple examples for esp8266.
— Reply to this email directly, view it on GitHub https://github.com/RandDruid/esp8266-deauth/issues/6#issuecomment-1152358283, or unsubscribe https://github.com/notifications/unsubscribe-auth/AZSDCC5CH6V36MROLOF7ZSTVOM62XANCNFSM4CNTHNFA . You are receiving this because you were mentioned.Message ID: @.***>
@kiki67100 hey man, where shall I paste those codes , I have flashed version 1.5 in my mcu board. Which line in deuth master shall I paste these codes and flash again in esp8266?
Please help
Hello Thanks for your source code :-) 👍
I add a white list feature see below my code :
Below call deauth function
check_whitelist(aps_known[ua].bssid)
This work like a charm :-)
Now you can deauth and use your wifi alone
Have a nice day