The Evil Twin Strikes Back: A Guide to Using the ESP8266 Evil Twin for Good (or Not-So-Good)

Dec 2, 2024 | Computers and Tech, ESP8266, Security and Penetration Testing | 0 comments

In the world of WiFi security, it’s essential to stay one step ahead of potential threats. The ESP8266 Evil Twin is a powerful tool designed to help you do just that. In this guide, we’ll walk you through the process of setting up and using the ESP8266 Evil Twin for WiFi penetration testing.

Disclaimer: Before we dive in, it’s crucial to emphasize that this device should only be used on your own network or with explicit permission from the network owner. Always ensure you have the necessary permissions and follow local laws and regulations when conducting penetration testing. We are not responsible if you choose to do something stupid, like break the law.

Setting Up the ESP8266 Evil Twin

ESP8266 Evil Twin - M1z23R AP

To begin, connect to the AP named “M1z23R” with password “deauther” with your phone or PC. This will give you access to the device’s control panel.

Once connected, open up your favorite browser and navigate to 192.168.4.1.

ESP8266 Evil Twin - Main screen

You’ll be presented with a list of available Access Points (APs) in range, including your target network. Select your target AP from the list.

Starting the Evil Twin

ESP8266 Evil Twin - SSID Select

Once you’ve selected your target, click the “Start Evil-Twin” button.

This will initiate the deauthenticating process and kick you off the device. The SSID name will also change to the same name as your target, requiring you to reconnect to the new network. Make sure to choose “Use this network as is” on your device if you have connection issues.

Starting Deauther

After reconnecting to the new AP, open up your favorite browser and navigate to 192.168.4.1.

ESP8266 Evil Twin - Start Deauthing

You’ll now have access to the control panel, where you can start/stop deauthenticating clients and monitor the results.

Normal Operation

As devices attempt to connect to the Evil Twin AP using the correct password, they will be deauthenticated. Eventually you are hoping someone will enter the WiFi password in the screen they are presented with when they connect to the fake access point you created.

Capturing the Target Password

When the target password is captured, the access point will automatically restart and return to its original settings, including the original SSID name. To verify that the password has been captured, simply connect back to the AP using your browser at 192.168.4.1. You’ll be presented with a success message indicating that the password has been captured.

ESP8266 - Evil Twin Caotured Password

 

 

Looking to pick one up?

We have you covered. If you want a fully setup ESP8266 Evil twin, check it out in our shop!

If you just need a case for the ESP8266 NodeMCU Board, we have you covered here also!

 

Conclusion

The ESP8266 Evil Twin is a powerful tool for WiFi penetration testing. By following this guide, you’ll be able to use it to identify vulnerabilities and improve the security of your own networks. Remember to always follow best practices and ensure you have the necessary permissions before conducting any penetration testing activities.

Written by Brian Ebarb

Related Posts

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *