Expanding Horizons: The WiFi Module

 One feature of the Flipper Zero that was quick to catch my attention isn't a core feature at all -- it's an optional add-on offered by the company. In videos demonstrating this module, users push a few buttons and crash WiFi networks, grab network passwords, and generally make network security look like a joke. So, real or fake? There's abstractness or "well, sort of" about this one. The answer is yes, it is real. So, lets take a look.

 On the top of the Flipper is an array of GPIO (General Purpose Input-Output) pins. Users can, if they know what they're doing, complete any number of electronics projects by way of these pins, from blinking LED's to more complex projects. The Flipper website sells a WiFi Dev board that fits into these pin slots. Coming in at $29.00 at the time of writing, this ESP32-S2 board is marketed for WiFi debugging purposes. However, by loading the Flipper with Unleashed or Xtreme (a quick and relatively easy process), this WiFi board can do much, much more.

The with the module plugged in and the proper firmware loaded, a user can scan WiFi networks and log data about them. That alone is huge. Using the data from this scan, clever users can grab the network's password. But that's just the beginning. After selecting the target network from a list, you have to option to run a deauth command.

When you disconnect from a network on you phone or computer, you're sending a deauth (de-authorize) packet to the network modem. The network receives your request and disconnects you from the network. When a user uses the deauth command on the Flipper, it spams the target network with deauth packets, causing the network to disconnect every device currently connected. Until the user chooses to stop sending deauth packets, no device is able to connect to the network.

This deauth method is extremely powerful. The network has very little recourse against this attack. The first thought of most network technicians would likely be to reboot the system (the old fallback) and that would work... until the user starts sending packets again, which could be immediately. This attack has the ability to cripple an entire building full of computers, so techs would be in a hurry to find a solution. Eventually, they would check the network's packet logs and notice a suspicious number of deauth packets. From there, it's just a matter of finding the device responsible, which can be extremely difficult. There are tools to find the signal's source, but most IT departments don't have then just laying around. 

If a user kept this up for very long, security will start looking for whoever entered the building around the time the packets started coming in, though that would be avoidable with some clever planning.

Where this could really be used maliciously is when avoiding detection by security systems. While businesses are closed circuit, many homes use WiFi cameras. If you deauth the network, the camera becomes useless.

All this is dangerous enough, but that's just half on the story regarding the WiFi module. The other half is what I'll write about next: an Evil Twin Attack. 

Comments

Popular posts from this blog

Introduction: The Flipper Zero

RFID and NFC: The Key Issue

Sub 1-GHz: The Key Fob