Skip to content

Commit 1874eca

Browse files
committed
Merge branch 'readme-usage-features' into 'master'
minor readme improvements See merge request 2020-dp-wifi-attacks-using-esp32-8266/esp32-wifi-penetration-tool!43
2 parents 5d3fe49 + 3ca5e56 commit 1874eca

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

README.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,16 @@ Obviously cracking is not part of this project, as ESP32 is not sufficient to cr
1717
- Parsing captured handshakes into **HCCAPX file** ready to be cracked by Hashcat
1818
- Passive handshake sniffing
1919
- Easily extensible framework for new attacks implementations
20+
- Management AP for easy configuration on the go using smartphone for example
2021
- And more...
2122
## Usage
22-
1. Build and flash it onto ESP32 (devkit or module)
23-
1. Power it
23+
1. Build and flash project onto ESP32 (DevKit or module)
24+
1. Power ESP32
2425
1. Management AP is started automatically after boot
25-
1. Connect to this AP
26-
1. In browser open `192.168.4.1` and you should see a web client to configure and control this tool like this:
26+
1. Connect to this AP\
27+
By default:
28+
*SSID:* `ManagementAP` and *password:* `mgmtadmin`
29+
1. In browser open `192.168.4.1` and you should see a web client to configure and control tool like this:
2730

2831
![Web client UI](doc/images/ui-config.png)
2932

0 commit comments

Comments
 (0)