exploitagency / ESPloitV2

WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, and PASV FTP exfiltration methods and an integrated Credential Harvester Phishing tool called ESPortal.
MIT License
559 stars 133 forks source link

ReFlashing #36

Closed Chainerenator closed 5 years ago

Chainerenator commented 5 years ago

Hello I ocassionaly switched to join network, and didn't see that reset to defaults tutorial =) So i've tried to re-flash and was following the guide 1) I made all prerequirements 2) I have loaded esp8266programer and Uploaded 3 ) Swithed to Generic Esp8266module and export compiled ESP_Code

image

Using library esp8266FTPServer-feature-bbx10_speedup at version 1.0.1 in folder: C:\Users\BezruchenkovK\Documents\Arduino\libraries\esp8266FTPServer-feature-bbx10_speedup 
Using library DNSServer at version 1.1.0 in folder: C:\Users\BezruchenkovK\AppData\Local\Arduino15\packages\esp8266\hardware\esp8266\2.3.0\libraries\DNSServer 
Sketch uses 508647 bytes (48%) of program storage space. Maximum is 1044464 bytes.
Global variables use 49612 bytes (60%) of dynamic memory, leaving 32308 bytes for local variables. Maximum is 81920 bytes.

4 ) I use the ESP8266Flasher.exe to load that compiled code like ESP_Code.ino.generic.bin

image image

5) next It is said to do last thing in Arduino upload Arduino_32u4_Code image

and then my led is rapidly blinking and i see only image

Where I' am wrong ????

Chainerenator commented 5 years ago

Oh - I fixed it... I think it was because it needed to erase flash mem like

python esptool.py -p COM12 erase_flash