Corey Harding
Corey Harding
134 is Right ALT 130 is Left ALT I will double check soon. Thanks for the heads up
No big deal. It was not intentional.
Hopefully I used 130 in all of the payload examples.
Start with reading the docs https://github.com/exploitagency/ESPloitV2/blob/master/README.md#resetting-to-default-configurationrecovering-device
Lets back track and you describe the steps you took to "flash it" and then lets figure out where things went wrong.
Use the precompiled binaries from my release page, your compiling using the wrong versions of all the libraries, then flash my binary using esptool or nodemcuflasher https://github.com/exploitagency/ESPloitV2/releases -- GPG Fingerprint:...
Also right now in software if the victim and device are connected to the same network there are several WiFi based exfiltration options HTTP and FTP and a login credential...
You need to be on the same network for those exfiltration methods to work, meaning you need access to their WiFi credentials, so crack it before hand or much easier...
This issue has gone way off course but here is an example of commands to force the victim to connect to ESPloit's network when in access point mode. Windows: netsh...
I will look into it if someone wants to donate the hardware and 2G service that works in the US. But why not try to create something original with broader...