Flipper/Wifi_DevBoard/ReadMe.md

61 lines
3.1 KiB
Markdown
Raw Normal View History

2022-06-30 18:57:17 +00:00
# Official info
2022-07-09 05:19:30 +00:00
The Wifi devboard ships with [Blackmagic firmware](https://github.com/flipperdevices/blackmagic-esp32-s2) installed. The Flipper documentation [is here](https://docs.flipperzero.one/development/hardware/wifi-debugger-module), and Blackmagic is [over here](https://black-magic.org/).
2022-06-30 18:57:17 +00:00
2022-07-09 05:26:07 +00:00
Quick start: Connect to the SSID `blackmagic` using the password `iamwitcher` or plug the wifi devboard in via USB.
2022-07-13 07:49:51 +00:00
# ESP32 Wi-Fi Pentest Tool
Check out [Frog's write-up](https://github.com/FroggMaster/ESP32-Wi-Fi-Penetration-Tool) and build for quick and easy flashing! Seriously, it's basically just a double-click.
# Some quick steps to get [Marauder](https://github.com/justcallmekoko/ESP32Marauder) installed<br>
2022-06-28 15:02:46 +00:00
(Direct from the dev WillStunForFood on Discord - check out [his video walkthrough](https://www.youtube.com/watch?v=_YLTpNo5xa0) too!):
2022-05-31 03:43:08 +00:00
- Plug the WiFi dev board directly into your PC
- Upload the MarauderOTA firmware from source via Arduino IDE
- Use the MarauderOTA firmware to flash the Marauder Flipper bin over WiFi
2022-05-31 03:43:36 +00:00
2022-05-31 03:44:54 +00:00
The first step in the wiki documentation [starts here](https://github.com/justcallmekoko/ESP32Marauder/wiki/flipper-zerowhile).<br>
2022-05-31 03:55:25 +00:00
(Then you should have the necessary links to the follow on documentation to get the firmware installed.)
ESP32-S2 is the correct board if you are installing on the Flipper WiFi Dev Board. <br>
If you are using the Marauder OTA method, you shouldn't have to install any libraries. <br>
The only other thing you should have to install is the boards for the ESP32 in the Arduino IDE and the drivers for the ESP32-S2.
2022-05-31 03:43:08 +00:00
2022-06-02 06:00:19 +00:00
Commands `channel`, `scanap`, `sniffbeacon`, `sniffdeauth`, `sniffpmkid`, `stopscan`, `clearap`
2022-05-31 03:29:16 +00:00
2022-07-14 21:29:40 +00:00
------------------------------------------------------------------------------
Example Attack Profile ([from Discord](https://discord.com/channels/740930220399525928/967843558520418384/997185157175988264)):
Use command `scanap` stop with `stopscan` when done.
List all found Beacons from previous steps via `list -a`
Note the enumeration of your target Beacon...
Use `select -a x` command to select your target. (x being your target # from previous step)
Execute chosen attack `attack -t deauth`
Use `stopscan` when done.
-----------------------------------------------------------------------------------
# Quick steps from Rabid Root...
2022-05-31 04:03:23 +00:00
![Quick_info](https://user-images.githubusercontent.com/57457139/171563068-4997e28d-ac75-4c22-96b3-9e21fb0cdb18.jpg)<br>
![Flipper_Settings](https://user-images.githubusercontent.com/57457139/176063404-86cfaa96-4cb5-4a94-a388-f935f59ac7b2.png)
# AND a great step by step from E_Surge!
![More_Steps](https://user-images.githubusercontent.com/57457139/176063439-f23620ae-7985-46eb-a11e-d85d1bcc62b7.png)
2022-07-09 17:46:53 +00:00
# If serial connection looks scrambled... (thanks Frog!)
![Scrambled](https://user-images.githubusercontent.com/57457139/178117119-01907ac3-e0db-4ab2-b248-1c38e5926693.png)
![Frog_Fix](https://user-images.githubusercontent.com/57457139/178117083-fb209d3e-660a-4cef-b80e-f2e25ed2060e.png)
2022-07-10 05:57:35 +00:00
2022-07-14 06:51:27 +00:00
Frog also noted that it's wise to reflash the Flipper firmware if such issues are persisting.<br>
2022-07-10 05:57:35 +00:00
Start with the Official firmware, test, then move to a unlocked one if desired.