Since I am not much of a security expert, could anyone kindly share their ideas on this topic or some resources/code examples that could help?
I have some knowledge of the board itself, how it functions and how it is programmed.
Explore... Chat... Share...
martin_g wrote:In general, an ESP8266 has about the same attack capabilities like any other WiFi-enabled device:
- it can passively sniff network traffic (best in open networks like hotspots, limited infos available as soon as the traffic is encrypted with WPA)
- it can act a MITM by pretending to be a legitimate AP/Hotspot/captive portal/web site
- it can actively send rouge messages what mainly results in some kind of DOS attack (DeAuth attack, Fake AP flooding)
What makes the ESP special is the fact, that it is so small, cheap and that it can run on batteries for quite some time. This means, it can be placed anywhere, possibly even in larger quantities. Even, if it is destroyed or unreachable after the attack, this doesn't really care the attacker.
I can think of attacks with an ESP8266 where someone hides one or more small devices somewhere at an observed place (public place, hotel, private home), where they wait for activation (possibly in deep sleep mode on batteries). When activated they may sniff the local network (or some physical sensors), may upload the observed infos via local WiFi. They even may be used to span a local rouge AP (same SSID as the original APs) an try to route some traffic over the ESP as MITM.
eduperez wrote:As "martin_g" explained, the main advantage of an ESP is the small size and low price. And other than making bigger headlines in the newspaper, I do not see how that can be of any benefit to someone doing security research.
Where do I find this Makefile (somewhere here on t[…]
Thankyou all for the advice so far. I've been loo[…]
If you use text boxes that are linked to variable […]
I have some ESP-01 boards that I programmed previo[…]
Hi, this looks to be catching on. https://imgur.co[…]
I was looking at that, but it looks to me as if th[…]
I understand that I could use SPI for this, though[…]
Anybody here know if is possible use the following[…]
Hi All, I am just wondering what process, device […]
I have updated the git for this ir blaster code qu[…]
And the third version - with data upload and relay[…]
HI there. Im going through the exact same issue […]
the secret document marked "confidential"[…]
you probably have to use the staging (2.4.0-rcX) v[…]
Hi, I'm using Phant & Freeboard on my own serv[…]
See docs for serialbranch https://docs.google.com[…]
To hook up the OLED screen refer to the esp8266 ba[…]
I realise this issue is over a year old now but do[…]
Hey! I try to add a five-second delay before the H[…]
Hello, I am building a web server with the ESP8266[…]