{"id":9519,"date":"2023-02-17T17:59:54","date_gmt":"2023-02-17T12:29:54","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=9519"},"modified":"2023-04-22T09:28:13","modified_gmt":"2023-04-22T09:28:13","slug":"esp8266-wifi-jammer-leather-creating-a-strong-wi-fi-jammer-recon-cyber-security-cyber-security","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/esp8266-wifi-jammer-leather-creating-a-strong-wi-fi-jammer-recon-cyber-security-cyber-security\/","title":{"rendered":"ESP8266 WiFi Jammer\/Leather: Creating a Strong Wi-Fi Jammer"},"content":{"rendered":"\n<h1 id=\"making-a-strong-jammer-with-the-esp8266-arduino-to-protect-your-wi-fi\" class=\"wp-block-heading\">Making a Strong Jammer with the ESP8266 Arduino to Protect Your Wi-Fi<\/h1>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Wi-Fi technology has proliferated in our daily lives in recent years. Wi-Fi is essential to our ability to access the internet, communicate with our gadgets, and maintain relationships with friends and family. But as Wi-Fi has become more widely used, there has also been an increase in cyberattacks and Wi-Fi hacking. This blog post will demonstrate how to use an<a href=\"https:\/\/www.amazon.in\/sspa\/click?ie=UTF8&amp;spc=MTo2NTc3ODc5MzEyODQxMjkzOjE2NzY2MzU1NTE6c3BfYXRmOjIwMDczMDcyNDQyMTk4OjowOjo&amp;url=%2FRobotbanao-NodeMcu-Development-Board-ESP8266%2Fdp%2FB07D32X6GN%2Fref%3Dsr_1_1_sspa%3Fadgrpid%3D59207975216%26ext_vrnc%3Dhi%26gclid%3DCj0KCQiA6LyfBhC3ARIsAG4gkF_BpFeO10gMUHMZqSayvu24T8WPx1kBpyM7AXLY-Jq4L3b7ARZceDQaApXYEALw_wcB%26hvadid%3D294132147737%26hvdev%3Dc%26hvlocphy%3D9061670%26hvnetw%3Dg%26hvqmt%3Db%26hvrand%3D9448776916810083754%26hvtargid%3Dkwd-355917347927%26hydadcr%3D25653_1777164%26keywords%3Dnodemcu%2Besp8266%2Bkit%26qid%3D1676635551%26sr%3D8-1-spons%26sp_csd%3Dd2lkZ2V0TmFtZT1zcF9hdGY%26psc%3D1\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#0a8cff\" class=\"has-inline-color\"> ESP8266 microcontroller<\/mark><\/strong><\/a>, often known as a Daughter, to create a potent Wi-Fi jammer.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h2 id=\"what-is-a-wifi-deauther-jammer\" class=\"wp-block-heading has-black-color has-text-color has-large-font-size\">What is a WiFi Deauther\/Jammer?<\/h2>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">By transmitting de-authentication<strong> (<em>Deauth<\/em>)<\/strong> frames to the targeted devices, a Wi-Fi jammer often referred to as a Deauther, can interfere with the Wi-Fi connection between a network and a device. Deauthentication is the process that makes the devices disconnect from the network. The Deauther can be used in several ways, such as to test the <a href=\"https:\/\/reconcybersecurity.com\/advance-networking-course\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">security of a network<\/mark><\/strong><\/a>, disable devices linked to it, and clog up its communication channels.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h2 id=\"what-is-the-esp8266\" class=\"wp-block-heading has-black-color has-text-color has-large-font-size\">What is the ESP8266?<\/h2>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The highly integrated Wi-Fi chip ESP8266 makes it possible for embedded devices to connect to the internet. It is a well-liked option for IoT projects because it is a low-cost Wi-Fi module with a complete TCP\/IP stack and microcontroller capability. You may create a variety of Wi-Fi applications, such as Wi-Fi Jammers\/Daughters, with the ESP8266.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/noe.jpg\" alt=\"\" class=\"wp-image-9521\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h2 id=\"esp8266-wi-fi-jammer-deauther-construction\" class=\"wp-block-heading has-black-color has-text-color has-large-font-size\">ESP8266 Wi-Fi Jammer\/Deauther Construction<\/h2>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">With an ESP8266, creating a Wi-Fi jammer is quite simple. Before moving on, it&#8217;s crucial to understand that it is unlawful and unethical to use a Wi-Fi jammer for malevolent purposes. You should only use this for educational and testing reasons, as we strongly suggest. So with that said, let&#8217;s get started.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Hardware Prerequisites<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong>With an ESP8266, you may create a Wi-Fi jammer by using the following parts:<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">a development board for the ESP8266, such as the NodeMCU or Wemos D1 Mini<br>USB connectivity for the power source<br>A laptop or computer to program the ESP8266. A Wi-Fi antenna.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">software specifications<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Arduino IDE library for ESP8266<br>ESP8266 Deauther Firmware ESP8266 Sketch Data Upload Tool&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\"><strong>Step 1:<\/strong> Install the Arduino IDE and ESP8266 Library.<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">Installing the <a href=\"https:\/\/reconcybersecurity.com\/how-to-install-arduino-software-ide-on-kali-linux-cyber-security-recon-cyber-security\/\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-purple-color\">Arduino IDE<\/mark><\/strong><\/a> and the <a href=\"https:\/\/github.com\/SpacehuhnTech\/esp8266_deauther\" target=\"_blank\" rel=\"noopener\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">ESP8266 library<\/mark><\/strong><\/a> is the first step. Both the ESP8266 library and the Arduino IDE are available for download from their respective websites.<a href=\"https:\/\/reconcybersecurity.com\/blogs\/it-knowledge\/how-to-install-arduino-software-ide-on-kali-linux-cyber-security-recon-cyber-security\/\" target=\"_blank\" rel=\"noopener\" title=\"\"> Install the Arduino IDE<\/a> and the ESP8266 library after downloading them by following the directions on the web pages for each program.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/2-1.png\" alt=\"\" class=\"wp-image-9522\" width=\"398\" height=\"429\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\"><strong>Step 2:<\/strong> Uploading Sketch Data<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The data from the sketch must then be uploaded to the ESP8266. The ESP8266 Sketch Data Upload Tool must be installed to accomplish this. Open the Arduino IDE after installation, then select Sketch &gt; Include Library &gt; Manage Libraries. Install the &#8220;<a href=\"https:\/\/github.com\/SpacehuhnTech\/esp8266_deauther\" target=\"_blank\" rel=\"noopener\"><em><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">ESP8266 Sketch Data Upload<\/mark><\/strong><\/em><\/a>&#8221; library by searching for it. To access the tool after installation, go to Tools &gt; ESP8266 Sketch Data Upload. Choose the &#8220;data&#8221; folder from the Deauther firmware by clicking &#8220;Select Sketch&#8221; and selecting it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/3-1.png\" alt=\"\" class=\"wp-image-9523\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">Step 3: Uploading Deauther Firmware is step three.<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\">The ESP8266 must then be updated with the <em>Deauther<\/em> firmware. Extract the Deauther firmware files to a location on your computer after downloading them from GitHub. Go to File &gt; Open in the Arduino IDE after starting it up. From the Deauther firmware, select the &#8220;<a href=\"http:\/\/arduino.esp8266.com\/stable\/package_esp8266com_index.json\" target=\"_blank\" rel=\"noopener\"><strong><em><mark style=\"background-color:rgba(0, 0, 0, 0);color:#fe0000\" class=\"has-inline-color\">esp8266 daughter<\/mark><\/em><\/strong><\/a>&#8221; file.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/4-1.png\" alt=\"\" class=\"wp-image-9524\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\"><strong>Step 4:<\/strong> Experimenting with the gadget<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong>1. <\/strong>Use the onboard micro USB connector to connect the module to a power source, or just turn on the switch if you&#8217;ve connected a battery as I have.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><br><strong>2. <\/strong>A WiFi network called <em>pwned<\/em> will be posted as soon as the module is connected. You must use a phone or laptop to connect to this WiFi network and type the password daughter.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><br><strong>3. <\/strong>Once the device is linked, launch an internet browser and go to <strong><em>&#8220;IP address&#8221;<\/em><\/strong>, which is the primary page from which you can manage anything.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><br><strong>4. <\/strong>Choose the WiFi network you wish to break into now.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><br><strong>5. <\/strong>Choose the kind of assault you wish to launch by going to the attack tab and choosing<strong>:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2023\/02\/5-1.png\" alt=\"\" class=\"wp-image-9525\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-medium-font-size\"><strong>6. <em>CONGO!<\/em><\/strong> The system is operating as it should.<\/p>\n","protected":false},"excerpt":{"rendered":"Making a Strong Jammer with the ESP8266 Arduino to Protect Your Wi-Fi Wi-Fi technology has proliferated in our&hellip;\n","protected":false},"author":1,"featured_media":10694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,55,18,241],"tags":[493,494,240,495,496,497,498,499,500,501,502,311,503,57,504,505,506,507,212,508],"class_list":{"0":"post-9519","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-hacking-tools","9":"category-installations","10":"category-it-knowledge","11":"tag-arduino-ide","12":"tag-creating-a-strong-wi-fi-jammer","13":"tag-cyber-security","14":"tag-deauther","15":"tag-esp8266","16":"tag-esp8266-library","17":"tag-esp8266-wi-fi-jammer","18":"tag-how-to-make-jammer","19":"tag-how-to-make-wifi-jammer","20":"tag-how-to-wifi","21":"tag-network","22":"tag-recon-cyber-security","23":"tag-security-of-a-network","24":"tag-social-media-hacking","25":"tag-what-is-the-esp8266","26":"tag-what-is-the-nodemcu","27":"tag-what-is-the-nodemcu-esp8266","28":"tag-wi-fi-applications","29":"tag-wifi-hacking","30":"tag-wifi-jammer"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=9519"}],"version-history":[{"count":3,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9519\/revisions"}],"predecessor-version":[{"id":10966,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/9519\/revisions\/10966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10694"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=9519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=9519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=9519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}