Detect when WiFi devices log into a network by using the auth command to listen to authentication packets. Use the beacon command to create fake access points and break MAC randomization.
More Deauther V3 Tutorials:
https://www.youtube.com/watch?v=tSH_wjFreHQ&list=PLqBJwWDE3G0JoM32vDkfl-JTa3WL8AiEs
00:00 Intro
01:19 Command structure
04:17 Basic auth scan
08:45 Auth scan + beacon attack
14:07 Auth scan + probe scan
16:19 Outro
Huhnitor: https://huhnitor.com/
Deauther V3 Git: https://github.com/SpacehuhnTech/esp8266_deauther
Huhnitor Git: https://github.com/spacehuhntech/huhnitor
Andromeda Board: https://spacehuhn.com/product/deauther-andromeda/
📡 ESP8266 Deauther: https://github.com/SpacehuhnTech/esp8266_deauther
🌍 Website: https://spacehuhn.com/
📝 Blog: https://blog.spacehuhn.com/
❤️ Donations: https://ko-fi.com/spacehuhn
🐙 Github: https://github.com/SpacehuhnTech