YouTube SummarySee all summaries
Watch on YouTube
Publisher thumbnail
Loi Liang Yang
3:5612/1/24
Cybersecurity

Flipper Zero WiFi DeAuth [ESP32] Marauder

12/2/24
Summaries by topic
English

This demonstration showcases how the Flipper Zero can be used to launch a Wi-Fi deauthentication attack, forcing disconnections between a mobile device and a Wi-Fi access point. The attack works by crafting deceptive messages disguised as the other party, effectively fooling the network and causing a forced disconnection. This is achieved through manipulating MAC addresses and sending disconnect messages.

Wi-Fi Deauth Attack

00:00:05 The Flipper Zero's Wi-Fi Marauder app can perform a deauthentication attack, disconnecting devices from a Wi-Fi network. This attack utilizes the ESP32 chip within the Flipper Zero. The attack can be launched by scanning nearby Wi-Fi networks, selecting a target, and initiating the deauthentication process.

MAC Address Spoofing

00:02:52 The Wi-Fi deauthentication attack works by spoofing MAC addresses. The Flipper Zero creates deceptive messages that appear to originate from either the access point or the connected device, causing the network to disconnect. The attack manipulates the MAC addresses of the targeted device and access point, crafting disconnect messages to disrupt the connection.