Flipper/Wifi_DevBoard/ReadMe.md
2022-08-01 15:32:31 -07:00

5.2 KiB

Official info

The Wifi devboard ships with Blackmagic firmware installed. The Flipper documentation is here, and Blackmagic is over here.

Quick start: Connect to the SSID blackmagic using the password iamwitcher or plug the wifi devboard in via USB.

ESP32 Wi-Fi Pentest Tool

Check out Frog's write-up and build for quick and easy flashing! Seriously, it's basically just a double-click now thanks to some error checking and automation. (You're welcome!).

Some quick steps to get Marauder installed

(Direct from the dev WillStunForFood on Discord - check out his video walkthrough too!):

  • Plug the WiFi dev board directly into your PC
  • Upload the MarauderOTA firmware from source via Arduino IDE
  • Use the MarauderOTA firmware to flash the Marauder Flipper bin over WiFi

The first step in the wiki documentation starts here.
(Then you should have the necessary links to the follow on documentation to get the firmware installed.)

ESP32-S2 is the correct board if you are installing on the Flipper WiFi Dev Board.
If you are using the Marauder OTA method, you shouldn't have to install any libraries.
The only other thing you should have to install is the boards for the ESP32 in the Arduino IDE and the drivers for the ESP32-S2.

Commands channel, scanap, sniffbeacon, sniffdeauth, sniffpmkid, stopscan, clearap, ssid, update


The ssid command is to edit the SSID list used for beacon attacks for when when you're running something like attack -t beacon -l
You can also use something like ssid -a -g 4 to randomly generate four SSIDs to the list. (Check it with list -s to see them!)
To add an SSID by name, use ssid -a -n YourSSID and replace YourSSID with the SSID name you would like.
Lastly, to remove an SSID from the list, use list -s then ssid -r # replacing # with the number from the list command.


To update the installed FW, you can use the update -w option, then follow along from Step 8 in the install guide.


Example Attack Profile (from Discord):

Use command scanap stop with stopscan when done.

List all found Beacons from previous steps via list -a

Note the enumeration of your target Beacon...

Use select -a x command to select your target. (x being your target # from previous step)

Execute chosen attack attack -t deauth

Use stopscan when done.


Connecting to the devboard with a Mac (from Discord)

Open Terminal

Enter ls /dev/tty.*

You will be provided with several USB directories. Select one that has your flippers name in it example: /dev/tty.usbmodemflip_XXXXX3

Add "screen" in the prefix and the baud rate as the suffix to the command after copy pasting.....

screen /dev/tty.usbmodemflip_XXXXX3 115200

Hit reset on the flipper board and you'll see it populate. If it doesn't, simply try the other flipper directory name.


Quick steps from Rabid Root...

Quick_info
Flipper_Settings

AND a great step by step from E_Surge!

More_Steps

Also from E_Surge: "Flashed esp32marauder directly to the esp32-s2 using the esptool command -- wasn't working until a PC restart and boom. But it took about three hours of different methods, attempts, and finally restarting of devices etc."

esptool -p PORT -b 460800 --before default_reset --after hard_reset --chip esp32s2 write_flash --flash_mode dio --flash_freq 80m --flash_size 4MB 0x10000 esp32_marauder_v0_9_9_20220628_flipper.bin

If serial connection looks scrambled... (thanks Frog!)

Scrambled

Frog_Fix

Frog also noted that it's wise to reflash the Flipper firmware if such issues are persisting.
Start with the Official firmware, test, then move to a unlocked one if desired.