whid-injector / WHID

WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.
MIT License
1.67k stars 244 forks source link

Can’t connect to Ip because auto payload #31

Closed lazyjay559 closed 5 years ago

lazyjay559 commented 5 years ago

I have auto payload selected. I wanted to change it back but now I cannot access the control page. I’m doing everything right connect to exploit and the correct ip but the page does not load and my whid keeps running script non stop until it’s unplugged. It doesn’t just run a few times and done. I also tried a hard reset with magnet but that won’t work either due to it continually running the script. I first plugged into an external power bank. The “exploit” ap shows and connects. I type in whatever the address was (can’t think what it is off the top of my head) and it just doesn’t load. Ive tried everything and no lick this is the 3rd day and I’m getting pissed now. If someone could help that would be amazing.

lazyjay559 commented 5 years ago

Any help here?????

exploitagency commented 5 years ago

Tap a ground on the reset pin of the 32u4 while trying to flash it and avrdude is looking for the device. It will take good timing and a few tries.

Flash the uploader sketch not the ESPloit sketch for the 32u4. Then disable the payload. Finally flash back the proper 32u4 ESPloit sketch. You could also upload a nearly blank sketch to the 32u4 that only sets the enable pin to power on the ESP.