risinek

Results 33 comments of risinek

@ArhiLeeve yes, there is a function for this in `esp_wifi` component [`esp_wifi_set_mac()`](https://docs.espressif.com/projects/esp-idf/en/latest/esp32s2/api-reference/network/esp_wifi.html#_CPPv416esp_wifi_set_mac16wifi_interface_tAL6E_K7uint8_t)

This restriction is implemented directly in ESP-IDF. There is a project that bypassed this restriction in https://github.com/GANESH-ICMC/esp32-deauther

Check https://github.com/GANESH-ICMC/esp32-deauther that bypasses the restriction implemented in ESP-IDF

you are using wrong hash mode. for hccapx files you should use hash mode 2500. See "Preparation" section on this wiki https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2#preparation Hash mode 22000 is used for cracking captured...

Good to know, thanks! Feel free to add it somewhere to the READMEs. And adding support for this new recommended hash mode will be worthy. I will make this an...

PMKID: 1. save the PMKID in hashcat format to some plain text file (e.g. test.16800) 2. run ./hashcat -m 16800 test.16800 -a 3 (or whatever attack type you want to...

Did you check logs and was there something suspicious, aren't there any critical failures causing constat reboots? Can you share logs maybe? What power source are you using?

NVS is disabled in sdkconfig file https://github.com/risinek/esp32-wifi-penetration-tool/blob/1874eca01d98eb6466de00077aa417d980878d75/sdkconfig.defaults

That's expected behaviour. During attack execution, this tool has to manipulate with Wi-Fi interface and/or start rogue APs, hence the ManagementAP may disappear during attack execution. But it should reappear...

What power source are you using for ESP32? Sometimes this can be caused by not enough power for example when the battery is not sufficient. But it can be also...