Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)
This code is a fork of Nickguitar's code. https://github.com/Nickguitar/cypher-5G-deauther
This code also uses tesa-klebeband's wifi packet injection code. https://github.com/tesa-klebeband/RTL8720dn-WiFi-Packet-Injection
I did web server stuff for simplicity
This code also demonstrates the capability of RTL8720dn performing SoftAP, promiscuous mode, and deauth at the same time (sort of).
This program can be compiled using AmebaD SDK version 3.1.7
Because I modified some of the core libraries, you may encounter a problem. Please let me know so I can fix it.
You may need to use this board definition or compilation will fail : https://drive.google.com/file/d/13FOQ47H48j42ArYKcxLlSIuS7eU7qN_B/view?usp=sharing
- Compile and flash the code
- Connect to "CAPPER" with password "12345678"
- Go to 192.168.1.1 in your browser
- Select your target
- Press Capture Handshake
- Wait for a while
- If the handshake is captured, Capture Handshake button will change to Get PCAP
Performing such attacks is ILLEGAL in most places. Make sure you are using it on controlled environment and NOT in public places.