Skip to content

ESP32 Marauder Cheatsheet

ESP32 Marauder Cheatsheet

Overview

The ESP32 Marauder is a portable penetration testing tool for Wi-Fi and Bluetooth analysis. It is based on the ESP32 microcontroller and can be used to perform a variety of attacks, such as deauthentication attacks, evil twin attacks, and Bluetooth sniffing. It is a powerful and versatile tool for security researchers and penetration testers.

Key Features

  • WiFi Scanning: Scan for nearby wireless networks and clients.
  • Deauthentication Attacks: Disconnect clients from their wireless networks.
  • Evil Twin Attacks: Create a rogue access point to intercept traffic.
  • Bluetooth Sniffing: Sniff Bluetooth traffic and analyze it for vulnerabilities.
  • Portable and Low-Cost: The ESP32 Marauder is small, portable, and inexpensive to build.

Getting Started

  1. Hardware: You will need an ESP32 development board, a display, and a few other components.
  2. Firmware: You will need to flash the ESP32 Marauder firmware onto your ESP32 board.
  3. Assembly: Assemble the hardware according to the instructions.
  4. Power On: Power on the ESP32 Marauder and you are ready to start hacking.

Common Attacks

  • WiFi Deauthentication: Use the deauthentication attack to disconnect clients from their wireless networks.
  • Evil Twin: Create an evil twin access point to intercept traffic from unsuspecting users.
  • Bluetooth Sniffing: Use the Bluetooth sniffing feature to capture and analyze Bluetooth traffic.

Defensive Measures

  • Use a VPN: A VPN will encrypt your traffic, even if you are connected to a rogue access point.
  • Disable Auto-Connect: Disable the auto-connect feature on your devices to prevent them from automatically connecting to unknown wireless networks.
  • Be Wary of Open Networks: Be suspicious of open wireless networks, especially in public places.
  • Use a Firewall: A firewall can help to protect your device from attacks, even if you are connected to a malicious network.

Additional Resources