This demonstration showcases how the Flipper Zero can be used to launch a Wi-Fi deauthentication attack, forcing disconnections between a mobile device and a Wi-Fi access point. The attack works by crafting deceptive messages disguised as the other party, effectively fooling the network and causing a forced disconnection. This is achieved through manipulating MAC addresses and sending disconnect messages.
Wi-Fi Deauth Attack
• 00:00:05 The Flipper Zero's Wi-Fi Marauder app can perform a deauthentication attack, disconnecting devices from a Wi-Fi network. This attack utilizes the ESP32 chip within the Flipper Zero. The attack can be launched by scanning nearby Wi-Fi networks, selecting a target, and initiating the deauthentication process.
MAC Address Spoofing
• 00:02:52 The Wi-Fi deauthentication attack works by spoofing MAC addresses. The Flipper Zero creates deceptive messages that appear to originate from either the access point or the connected device, causing the network to disconnect. The attack manipulates the MAC addresses of the targeted device and access point, crafting disconnect messages to disrupt the connection.