Flipper Zero WiFi DeAuth [ESP32] Marauder



Wi-Fi De-authentication Attack Summary

Short Summary

The video discusses how to use a Flipper Zero device to execute a Wi-Fi de-authentication attack, effectively disconnecting a mobile device from its Wi-Fi access point.

Key Points

  • The presenter connects to the Loy Network using the Flipper Zero device.
  • The attack is aimed at forcing disconnection between a mobile device and its Wi-Fi access point.
  • The Flipper Zero is equipped with a three-in-one bot, utilizing specific features for Wi-Fi manipulation.
  • The presenter navigates through the Flipper Zero interface, selecting the ESP32 and the Wi-Fi Mare functions.
  • A scan is conducted to identify nearby Wi-Fi connections, including the targeted network.
  • After selecting the target network, the presenter initiates a de-authentication attack.
  • Upon executing the attack, the mobile device is successfully disconnected from the Wi-Fi.
  • The attack exploits MAC addresses, allowing the Flipper Zero to impersonate both the mobile device and the access point to send disconnect messages.

Youtube Video: https://www.youtube.com/watch?v=y6G_1QBFBpw
Youtube Channel: Loi Liang Yang
Video Published: 2024-12-01T10:29:13+00:00