Despite this being a year ago, you are still the only person who has gone through the entire workflow like you mentioned near the end of your video. Nobody has done it for flipper zero aside from you, obviously, pwnagotchi, Marauder tutorials or anything like that. Thank you very much for making this!
For anyone having issues with step zero, I figured it out: First: Use his video on how to install python and git. The error you are getting is because python isn’t installed properly or maybe you have two version of python. Second: ensure the Marauder folder you download is moved to documents and NOT downloads. Python cannot access files that are in downloads. After this, that should be it! I hope this helps! I spend probably 2-3 hours figuring this out lol
@@AlexSingletonMusic did you get it to work? Were you able to successfully grab the pcaps/logs and also I can’t get my marauder to deauth my devices but it’ll still inject Rick rolls and probe the network, any thoughts?
@@RUNTHE40ROLL yes I did, my best guess is that you haven’t set the Sniff to raw. That’ll collect the data. You just need to make sure click on sniff after you’ve deauthed it, fairly quickly too
As for hashcat itself, it prefers to be ran from a cmd inside the folder. It also prefers that the user convert the pcap with the hcxdumptool -> hcxpcapngtool -> hcxhashtool (additional hcxpsktool/hcxeiutool) -> hashcat or JtR workflow method. Also straight from hashcat: “Do not clean up the cap / pcap file (e.g. with wpaclean), as this will remove useful and important frames from the dump file. Do not use filtering options while collecting WiFi traffic.”
@@douglasmiranda2004 There is a new link but it does not reach 74 GBs... It must be rebuilding. How ever I found a list but it also includes people's emails and it is public release but the list is so big it crashes any web browser. Plus you might need a VPN because it is own by Russia hackers....
FYI If you type cmd into the location in Windows Explorer it will launch a command prompt in that folder so you don't have to cd to it. Thanks for another great video.
wow... quite the fun fact. thx... this might come in handy.... What about mounted remote disks [linux] ? Will this automatically shell into the remote location? The answer is YES. But you won't shell directly into the linux shell, but will be in the localized : associated with that mounted disk. But still this will access that drive location... Derp
There are two things to complete your work: 1. With Marauder, you can easily create your own script at the bottom of the app, so there is no need to switch rapidly between deauth and sniffing. 2. You should have mentioned that it can take a really long time to crack -recover- your own password from the hc22000 file, depending on the number of characters. If you are interested, I can show you a way to use the power of multiple computers with Hashcat instead of just one.
@@verbalhustle Flipper > Applications > GPIO > [ESP32] Marauder > Scripts (at the bottom) > [+] Add script And there, after scanning and manually selecting your ap, you can create a script that will deauth for x seconds and then sniff raw for x seconds
@@maxencelaurent4885 You seem very knowledgeable, can you please make some videos on how this can be done? Even the Hashcat on multiple PCs thing sounds very cool
@@shaners1 Aha thank you! I don't have much time to do it, but I would love to collaborate with someone to make it possible, I have cybersecurity degree and I just love it so I think I can help people aha
Thank you for the lesson! Nowadays with all these smart devices at home, I've become more and more aware of vulnerabilities and want to make sure things are as secure as possible.
That's the big vulnerability. When I ran this on my actual router, the device that actually got deauthed and I grabbed handshakes from was my raspberry Pi that i use for OctoPrint
@chivo0317 the sad thing these vulnerabilities have been around since the 90's if not 80's. I was hacking wifi since 2000 or so, wep then WPA when it came out. Nothing much has changed or ever will. There will always be a way to protect, but with so much tech it will drive you crazy trying.
So funny but good to see all you new folk on the scene. I was using wireshark in the 90's... then we called it ethereal. Nothing beats the 80's and 90's hack scene... free phone calls on pay phones etc . Good times indeed
So, essentially the Flipper Zero + wifi card's only purpose was to provide a wifi radio that could be ran in promiscuous mode? After that it's just brute force attacks.
All the way at the bottom of the wifi marauder in the flipper zero should say save to flipper sdcardif you click that it will ask if you want to save pcaps to the flipper zero it will be saved in the apps_data/marauder/pcap folder
Hi Sasquatch, I see in a few threads, forums etc that quite a few people (including myself) just get empty pcap files. No matter what i try or how long i leave a raw sniff running then when i drag the pcap file into Wireshark its completely empty everytime - any help or suggestions? :)
so i deleted my original comment, fixed the problems, now it will not flash to the board in powershell, keeps telling me OSError(22 'A device which does not exist was specified, cant really find anything on it, is there another way to flash the software with this updated firmware to still use the hacker?
Same here, I've noticed "Erase completed in 0.4 seconds, Staying in bootloader, Firmware erased" Instead of "firmware erased" I'm getting "Traceback" then the cannot configure port. I did the powershell install of python and git...not sure
i did everything that you did on the flipper zero but when i put my pcap into wire shark, it would just be blank. nothing would show up. how do i fix this?
I followed this video and all the apps were update a couple of days ago and they say PRELOAD FAILED API VERSION. Any advice? Nothing on the device is working.
Whenever I drag the PCAP file into wireshark, the file is open but there is nothing in it and when I then enter eapol there is still nothing and when I save the file the extension is .erf and not .pcap so the converter also says error. Does anyone know a solution for this?
I keep getting this error when trying to flash the SD serial firmware: Cannot configure port, something went wrong. Original message: OSError(22, 'A device which does not exist was specified.', None, 433) Unable to erase the firmware on esp32s2 Any ideas? I am running on Win 11
I get the same errors. I am wondering if it is because the dev board does not have a sd card and maybe I should select a different option other than 2 during the install. Did you resolve this?
At 5:11 in my powershell i dont have option 2 : Flash SD Serial Marauder on Devboard or ESP32-S2 I have this option: Save Flipper Blackmagic WiFi settings. I have an ESP32-S2 WROVER. can I save on this option??
I can get through everything but it doesn't save a PCAP file. I've reflashed the board twice to make sure I am doing the right serial option #2 and it still doesn't save the pcap file to the sd card.
@rj8868 just finished the first semester and it's going pretty good ngl it's way easier than highschool. Also halfway through the Google cybersecurity course. Think im gonna try and figure out how to use a virtual machine today so I can practice more in Linux and SQL. Have to take a gender and race class next semester though which is gonna be lame as fuck.
I target my IP through target, but when I run the sniff - raw i get information from all the wifi's around me. Is this supposed to happen? Or is the target for the deauth only?
my pcap file is always 0bits in size... so nothing happens when i load it into wireshark EDIT: I've use BOTH options 1NAD 2 when trying to flash the board. i can scan, see AP's, all the rest. but no matter WHAT I DO... my pcap files are empty in perpetuity :D I have MUCH better luck sniffing, deauthing, and cracking hashes using my kali linux virtual box LOL i fear this little device and the "wifi dev board".... are not much more than little gimmicks
Been trying now for a few days, managed to get the menu working in Powershell but when I run option 2 I get "Cannot configure port, something went wrong. Original message: OSError(22, 'A device which does not exist was specified.', None, 433)". Any ideas?
I sorted it in the end but cannot remember how but it involved installing more files in order to get it to work. I just backtracked using google tracing the error messages and following a trail from others who had similar issues.
You might have not captured the handshake, make sure you wait for some time to capture enough traffic. You can test by keeping your sniffer on while joining the network with another device.
Problem I'm having is no data in the Pcap. I'm switching to sniff (raw) as fast as I can after deauth. Letting it run for various lengths of time but with no success of even 1kb of data, nothin shows up in wireshark because of this. Used on a known 2.4ghz network as well. Thank you for your time and awesome videos!
avais le meme problème , j avais le firmware 10.3 et une carte sd dans mon slot du flipper zero, jai flashé le wifidevboard avec la version 10.4 mais avec un bin serial... me demander pour + d infos
I got to wire shark put the rawsniffed file in and it showed nothing to which I hit the shark fin button and it started showing tons of numbers and when I look up eapol it doesn’t show anything, any word on what I could be doing wrong?
Yeah…not working at all. I installed the drivers, but as soon as I hit the reset button on the Wi-Fi board, the esp32-s2 pops up in device manager with no driver. Windows says the drivers from silicon labs aren’t for the hardware. The installer finds the chip, but it says it can’t configure the port. I can’t find anything mentioning this error except for some unresolved issues like this on Reddit.
All things were going well until the step of 8m0s in the video,my Marauder app can't generate a correct pcap file after sniffraw.Though it generated a file then,but when I export it,the file manager shows the size of data is 0B,that means it's a empty file.I tried several of methods to solve this problem,but they all failed.I have been working on it for at least 8 hours.I need help now.
So I did it all and had 1-4 of the EAPOL I ran it through and it came back as exhausted. I checked the password list and the password I had used was listed in there. Any reason this didn't work?
@@swplayer1111 death will kick your device off the network and then when you sniff, you want to capture the handshakes from the device actively reconnecting to that network.
How come when I run wireshark I get permission denied when trying to capture my own packets? Hopefully the same gentleman who sent me my Microsoft call center refund (it’s on the wire) will help me with my wireshark.
For some reason I am unable to flash the SD_serial version onto my board. I can flash the non sd version using Frog's .bat file no problem. What am i doing wrong?
The file appears to be damaged or corrupt (Commview: NCFX data length 0 < 20) What to do ? I've dried Pcapfix but it claims that there ain't no data in that file while It does gain size, but Hexedit gives me nothing but 0's or windows notes shows me nothing but you can move your cursor so there is data there.. Blank file with size in it ?. I guess that Im sniffing it wrong.
@@georgekoumanos8621 Nope still asking around and looking but dice. I even tried Unleashed firmware and it did nothing. Since Pcap fix and Wireshark claims it's corrupted I start to lean the blame on Maruder, I wonder if there is a config file that needs to change a setting. But I haven't had much time to find a solution. Let me know if you figure something out =)
@@kapone2k Replied before with link to marauder release but maybe it got blocked? Reverted back to 0.10.5 version and managed to open new pcap files fine. They are actually ~5 times larger than previous "empty" ones. Now I get no eapol packets but I'll tackle this next. btw 0.10.5 is missing a lot of stuff so will keep an eye for future fix
everything works well, but when I start the hashcat program with the converted file, it never give me a password, if I try using a password list, the psw it's obviously noy in that list, but If I send it without a list, after a while it gives me this: No password candidates received in stdin mode, aborting
Can anyone provide a fix for the pcaps not storing on the Flipper SD card? I have all the Flipper firmware updates, flashed the esp, and can successfully pull of the deauth. I select and see the packets coming through the devices, but my pcap files are always 0 bytes. I tried the recommended fixes in other forums, but the pcaps are always empty. Thanks.
How do I do this on a Mac? I downloaded wireshark and saved the file. But from that point on I can’t use the commands used in the video as I’m not using a windows machine at the moment
Really cool video but it hasn't worked for me on my home network. I have my phone connected to my ISP Wifi (I changed the SSID to run tests), ran the deauth attack before going to the sniff raw; my iPhone doesn't get disconnected and downloading the pcap file, it's got content but applying the eapol filter leads to an empty list. Could it be that my wifi router has a protection that prevents this ? Note: I also tried to set up a wifi network without security but DeAuth doesn't work. I'm using my ISP Wifi as well as TP Link Deco.
Mimicked step zero, but it did not work. Looks exactly like your Powershell cmd lines. error i got "pip3 : Ther Term 'pip3' is not recognized as the name of a cmdlet, function, script file, or operable program. Help!
I had the same problem but another comment was able to guide me. First thing to do is watch the first video in the series. It's only like 3 minutes and it fixed my step zero issue.
In addition to my previous comment, you need to make sure you downloaded The Marauder flash to your documents folder. For some reason python can’t view files that are in the downloads folder, so when you run step zero it will return an error. I just spent hours trying to figure this out and it finally worked 😂
also check the application itself on the bottom of the wifi marauder was an option to save files to my SD card , I didn't realize it was there and was having the same problem. As soon as I allowed it to save to the SD card pcap files were in the folder
@@brianreip411 Thanks bro, I checked what you mentioned and you were right, but I still have the error. I probably made an error while installing something, but I haven't gotten around to fixing it. Thank you so much!
what color should the wifi board LED be when plugging in? it only seems to connect when its red but it's unable to get most of the marauder data when i try to flash it onto the board
Hi Sasquach, when I try to flash I recieve this error: Cannot configure port, something went wrong. Original message: OSError(22, 'A device which does not exist was specified.', None, 433) Unable to erase the firmware on esp32s2
Hello can someone please help me find out this issue I've watched countless videos and none have worked my problem is that for step 5 it says my esp 32 wifi dev board isn't recognized I even installed the universal drivers still didn't work.
Hello everyone, little help needed here. I am following the steps carefully but all my pcap files are empty 0 octet. Is someone there able to point me on how to fix my issue? Regards!
Wait, the whole process only works if I have a common password?! So it won't work if for example I use my own invention which is a nickname from X book protagonist I invented myself, in l33t and special symbols? Basically this just works for boomer passwords, easy passwords and provider default passwords?
I’m really interested in Flipper and everything it can do but I don’t understand anything about what I just saw or what it is. Where do you suggest I can learn what all of this stuff means for someone interested in learning computer tech, programming and whatever else this is? Thanks for any and all help!
Not clear for me what moment of the video you stract the password of the wifi network, i have read many post and all of them agree that is not possible to hack wifi passwords with flipper zero. I want to know if you can extract any wifi password with this device its or not possible to do?
I can get all the way to the command prompt no problem, then my ignorance takes over. i feel like im following your instructions to the letter, but always get the error "cannot find the drive specified" Any help for a novice on this part?
Hello and thank you for the hard work you put for us. I have failed to actually get it work before your guide. Do you have another link of the Delilah's huge password list? The link is not working.
i keep getting this error when i try to boot the flasher into the wifi kit "Cannot configure port, something went wrong. Original message: PermissionError(13, 'A device attached to the system is not functioning.', None, 31) Unable to erase the firmware"
Hey Squanch, if the password is NOT in the list, i.e you're doing this with a password set up when youre native language is not english? is this password list truly needed or not?
Wait, so it has to be a common password? Meaning that mine can't be cracked? I use 3 initials of 3 different words in which one is a made up word, mashed together in l33t
My flipper has the same custom firmware RM and it is the latest firmware, the flash of the dev board to make it do the WIFI marauder works but I just can't get it to deauthorize the WIFI I selected. I'm wondering in this video did you set up a router to make it able to deauthorize because doing some research it says you can't deauthorize a router that has 5ghz is not able to do this attack but some 2.4ghz will. I'm just super confused and any help would be great.
Despite this being a year ago, you are still the only person who has gone through the entire workflow like you mentioned near the end of your video. Nobody has done it for flipper zero aside from you, obviously, pwnagotchi, Marauder tutorials or anything like that. Thank you very much for making this!
There's a new version of this video too!
That is false.
@@decambra89 frfr
@@TalkingSasquach couldnt find the newer version
For anyone having issues with step zero, I figured it out:
First: Use his video on how to install python and git. The error you are getting is because python isn’t installed properly or maybe you have two version of python.
Second: ensure the Marauder folder you download is moved to documents and NOT downloads. Python cannot access files that are in downloads.
After this, that should be it! I hope this helps! I spend probably 2-3 hours figuring this out lol
BRO I CANNOT THANK YOU ENOUGH I WAS STUCK ON THIS FOR THE PAST 2 HOURS
@@RUNTHE40ROLL happy to help! I probably worked on this entire project for probably 3+ hours at like 2 in the morning and figured I share it.
@@AlexSingletonMusic did you get it to work? Were you able to successfully grab the pcaps/logs and also I can’t get my marauder to deauth my devices but it’ll still inject Rick rolls and probe the network, any thoughts?
@@RUNTHE40ROLL yes I did, my best guess is that you haven’t set the Sniff to raw. That’ll collect the data. You just need to make sure click on sniff after you’ve deauthed it, fairly quickly too
@@AlexSingletonMusic Thxx for the help, you should make a vid that covers Step 0.
As for hashcat itself, it prefers to be ran from a cmd inside the folder. It also prefers that the user convert the pcap with the hcxdumptool -> hcxpcapngtool -> hcxhashtool (additional hcxpsktool/hcxeiutool) -> hashcat or JtR workflow method.
Also straight from hashcat: “Do not clean up the cap / pcap file (e.g. with wpaclean), as this will remove useful and important frames from the dump file. Do not use filtering options while collecting WiFi traffic.”
the 74gb pwd list / dictionary link is down for me. Any hint concerning mirrors or alternatives would be very appreciated.
Yea it died... RIP
My issue is it is not saving any data onto the pcaps file...
The current link lets me download just no longer loads up on web page.
Would a new link to the 74gig file be possible?
@@douglasmiranda2004 There is a new link but it does not reach 74 GBs... It must be rebuilding. How ever I found a list but it also includes people's emails and it is public release but the list is so big it crashes any web browser. Plus you might need a VPN because it is own by Russia hackers....
FYI If you type cmd into the location in Windows Explorer it will launch a command prompt in that folder so you don't have to cd to it. Thanks for another great video.
I literally just learned this lol, I'm a n00b too!
wow... quite the fun fact.
thx... this might come in handy....
What about mounted remote disks [linux] ? Will this automatically shell into the remote location?
The answer is YES. But you won't shell directly into the linux shell, but will be in the localized : associated with that mounted disk. But still this will access that drive location... Derp
This also works with pwsh too (PowerShell Core)
There are two things to complete your work:
1. With Marauder, you can easily create your own script at the bottom of the app, so there is no need to switch rapidly between deauth and sniffing.
2. You should have mentioned that it can take a really long time to crack -recover- your own password from the hc22000 file, depending on the number of characters. If you are interested, I can show you a way to use the power of multiple computers with Hashcat instead of just one.
Create your own script? Care to elaborate?
@@verbalhustle Flipper > Applications > GPIO > [ESP32] Marauder > Scripts (at the bottom) > [+] Add script
And there, after scanning and manually selecting your ap, you can create a script that will deauth for x seconds and then sniff raw for x seconds
@@maxencelaurent4885 You seem very knowledgeable, can you please make some videos on how this can be done? Even the Hashcat on multiple PCs thing sounds very cool
@@shaners1 Aha thank you!
I don't have much time to do it, but I would love to collaborate with someone to make it possible, I have cybersecurity degree and I just love it so I think I can help people aha
I have a cyber security degree too. Just ordered my flipper. Can't wait to take my shit to work and have some fun.
Thank you for the lesson! Nowadays with all these smart devices at home, I've become more and more aware of vulnerabilities and want to make sure things are as secure as possible.
That's the big vulnerability. When I ran this on my actual router, the device that actually got deauthed and I grabbed handshakes from was my raspberry Pi that i use for OctoPrint
@chivo0317 the sad thing these vulnerabilities have been around since the 90's if not 80's. I was hacking wifi since 2000 or so, wep then WPA when it came out. Nothing much has changed or ever will. There will always be a way to protect, but with so much tech it will drive you crazy trying.
So funny but good to see all you new folk on the scene. I was using wireshark in the 90's... then we called it ethereal. Nothing beats the 80's and 90's hack scene... free phone calls on pay phones etc . Good times indeed
The good old days. I spent countless hours making a redbox only to learn our local telco didn't use those tones
So, essentially the Flipper Zero + wifi card's only purpose was to provide a wifi radio that could be ran in promiscuous mode? After that it's just brute force attacks.
everything is installed correctly but PCAPs showing 0kbs and not storing packets
Same
Same
Any updates on this?
All the way at the bottom of the wifi marauder in the flipper zero should say save to flipper sdcardif you click that it will ask if you want to save pcaps to the flipper zero it will be saved in the apps_data/marauder/pcap folder
@@bojjeds3921 to what I said
Hi Sasquatch, I see in a few threads, forums etc that quite a few people (including myself) just get empty pcap files. No matter what i try or how long i leave a raw sniff running then when i drag the pcap file into Wireshark its completely empty everytime - any help or suggestions? :)
Having the same issue
did you ever figure it out??
I had the same thing. What I did was i re-flashed my wifi devboard and it worked.
@@oofyx9776 Thanks I'll give that a try!
@@oofyx9776 Just tried to reflash a few times but still the same problem :(
Error in Wireshark when dragging the file ...
The file "sniffraw_0.pcap" appears to be damaged or corrupt. (commview NCFX data length 0
Having the same problem
@@prokazzza8402 My understanding is it has to do with a wrong version of Wireshark, or the headers are bad in the file. I am looking into it.
I need help too
The file "sniffraw 0 (1).pcap" appears to be damaged or corrunt (commview: NCFX data length 0
did all of you google it? I found an easy answer researching myself.
In powershell i copy & pasted it but there stays pip3 is nog reconised 3:41 in the video
Pip3 isn’t recognized, it keeps saying it’s not a recognized script file or operable program. I installed git and the drivers not sure what wrong :/
im not able to get anything on to the pcap file...shows always zero, tried this online tutorial as in the discord...but still zero
ruclips.net/video/IU8KaRjdxfQ/видео.htmlsi=sYHl0KwyxxpTaSbW
This worked for me.
so i deleted my original comment, fixed the problems, now it will not flash to the board in powershell, keeps telling me OSError(22 'A device which does not exist was specified, cant really find anything on it, is there another way to flash the software with this updated firmware to still use the hacker?
running into the same error here
same problem as well
Same here, I've noticed "Erase completed in 0.4 seconds, Staying in bootloader, Firmware erased" Instead of "firmware erased" I'm getting "Traceback" then the cannot configure port. I did the powershell install of python and git...not sure
i fixed the issue by switching to my linux machine instead of windows, worked fine
I changed my firmware to SquachWare and used this ruclips.net/video/v8J1tNtefPs/видео.html video and it worked. Skip to about 1:40
i did everything that you did on the flipper zero but when i put my pcap into wire shark, it would just be blank. nothing would show up. how do i fix this?
@Linux.Nikita same.
It doesn't show the Maradeur app on Flipper. After all the steps, when I connect the board to a flipper, there is no Maradeur in GPIO
I'm getting a PIP3 error in Powershelll. Did I miss a step?
Adjust your settings on Windows Defender. Mine blocked the process to start with. Once unblocked, works fine.
I followed this video and all the apps were update a couple of days ago and they say PRELOAD FAILED API VERSION. Any advice? Nothing on the device is working.
I keep getting error "commview: ncfx data length 0 < 20" when I try to open a pcap file in wireshark. anyone have this issue or know a fix??
Did you get around this? I get the same issue
Whenever I drag the PCAP file into wireshark, the file is open but there is nothing in it and when I then enter eapol there is still nothing and when I save the file the extension is .erf and not .pcap so the converter also says error. Does anyone know a solution for this?
I see the file in wireshark but when I put Eapol nothing gets filter out. I don't have anything that's eapol , I'm not sure why
@@brianreip411 same question here, any solution?
I keep getting this error when trying to flash the SD serial firmware:
Cannot configure port, something went wrong. Original message: OSError(22, 'A device which does not exist was specified.', None, 433)
Unable to erase the firmware on esp32s2
Any ideas? I am running on Win 11
I get the same errors. I am wondering if it is because the dev board does not have a sd card and maybe I should select a different option other than 2 during the install. Did you resolve this?
@@abuttieri no luck so far
At 5:11 in my powershell i dont have option 2 : Flash SD Serial Marauder on Devboard or ESP32-S2
I have this option: Save Flipper Blackmagic WiFi settings.
I have an ESP32-S2 WROVER. can I save on this option??
Hey i m kinda stuck tried it for hours but cant catch the eapol protocol any suggestions ?
PMKID active sniff. And possibly connect and disconnect multiple times with your phone to the wifi
Hello! My flipper isn’t recording anything in pcaps. The files are just empty. Have I done something wrong?
I can get through everything but it doesn't save a PCAP file. I've reflashed the board twice to make sure I am doing the right serial option #2 and it still doesn't save the pcap file to the sd card.
Same here. Did you figure out why?
@@polilla32 unfortunately I haven't touched it in a couple months and i've totally forgotten!
9:44 what should I do if I enter eapol and it doesn't show handshakes?
yo bro I'm an 18 year old about to go to college for cyber security and I don't know shit about anything but ur videos have been so helpful🙏🙏🙏
im in the same boat bro
how school going
@rj8868 just finished the first semester and it's going pretty good ngl it's way easier than highschool. Also halfway through the Google cybersecurity course. Think im gonna try and figure out how to use a virtual machine today so I can practice more in Linux and SQL. Have to take a gender and race class next semester though which is gonna be lame as fuck.
I target my IP through target, but when I run the sniff - raw i get information from all the wifi's around me. Is this supposed to happen? Or is the target for the deauth only?
my pcap file is always 0bits in size... so nothing happens when i load it into wireshark
EDIT: I've use BOTH options 1NAD 2 when trying to flash the board. i can scan, see AP's, all the rest. but no matter WHAT I DO... my pcap files are empty in perpetuity :D
I have MUCH better luck sniffing, deauthing, and cracking hashes using my kali linux virtual box LOL
i fear this little device and the "wifi dev board".... are not much more than little gimmicks
I get the exact same problem, my pcaps are always empty no matter what I try - I'm trying to find a solution to this in the forums/Discord
@@dharrington1973did you find anything?
il, faut changer de firmware et re flasher la devboard, me contacter pour + d infos
@@denioche tu as telegram ?
I have the same problem.
Been trying now for a few days, managed to get the menu working in Powershell but when I run option 2 I get "Cannot configure port, something went wrong. Original message: OSError(22, 'A device which does not exist was specified.', None, 433)".
Any ideas?
I'm also getting this error, anyone else make it past this?
@@aveedell1 Did anyone figure this out? @TalkingSasquach
Same problem, can anyone help solving this?
Did you plug the usb-C into the dev board, not into the flipper? I know it is stupid, but that was my mistake that resulted into this error....
I sorted it in the end but cannot remember how but it involved installing more files in order to get it to work. I just backtracked using google tracing the error messages and following a trail from others who had similar issues.
in wireshark I'm not seeing anything when I filter "eapol" is there a reason why?
You might have not captured the handshake, make sure you wait for some time to capture enough traffic. You can test by keeping your sniffer on while joining the network with another device.
Problem I'm having is no data in the Pcap. I'm switching to sniff (raw) as fast as I can after deauth. Letting it run for various lengths of time but with no success of even 1kb of data, nothin shows up in wireshark because of this. Used on a known 2.4ghz network as well. Thank you for your time and awesome videos!
Usually means that your DevBoard has the wrong firmware on it
avais le meme problème , j avais le firmware 10.3 et une carte sd dans mon slot du flipper zero, jai flashé le wifidevboard avec la version 10.4 mais avec un bin serial... me demander pour + d infos
@@TalkingSasquach could you remind me the easiest way to update the devboards firmware please? Thanks a mill
ruclips.net/video/IU8KaRjdxfQ/видео.htmlsi=sYHl0KwyxxpTaSbW
This fixed the issue for me.
can someone explain im stuck at the eapol part and i dont know what to do i dont know that much about these things
What is a skid?
Maybe a skid mark from dirty sasquatch undies??
I got to wire shark put the rawsniffed file in and it showed nothing to which I hit the shark fin button and it started showing tons of numbers and when I look up eapol it doesn’t show anything, any word on what I could be doing wrong?
same question here, any solution?
Yeah…not working at all. I installed the drivers, but as soon as I hit the reset button on the Wi-Fi board, the esp32-s2 pops up in device manager with no driver. Windows says the drivers from silicon labs aren’t for the hardware. The installer finds the chip, but it says it can’t configure the port. I can’t find anything mentioning this error except for some unresolved issues like this on Reddit.
I am having "kinda" the same issue, right now.
@@linguadesogra5287same...
All things were going well until the step of 8m0s in the video,my Marauder app can't generate a correct pcap file after sniffraw.Though it generated a file then,but when I export it,the file manager shows the size of data is 0B,that means it's a empty file.I tried several of methods to solve this problem,but they all failed.I have been working on it for at least 8 hours.I need help now.
Having same exact issue.
@@N2CFX Sniff pmkid! Not raw this issue was beating my ass too
@@jayrflocca6704 what option in PMKID? passive active? list targeted active or passive?
So I did it all and had 1-4 of the EAPOL I ran it through and it came back as exhausted. I checked the password list and the password I had used was listed in there. Any reason this didn't work?
I'm having same problem
@@gratefuldylan8222 it means the password isnt in the list
I keep getting a write timeout error when trying to flash the board. I followed instructions to the tee. Is this sensitive to a specific usb c cable?
😮my duuuude, thanks for all the great videos you make.
if im going to bruteforce the pw why do ineed all the extra steps?
Hi. I tried this in 2024 and it only creates the pcaps files but they have no information, they weigh 0 kb and Wireshark cannot read them. Any ideas?
I'm wondering why my wireshark shows up nothing when I type EAPOL
@swplayer_ that means you didn't capture it
Did you DEAUTH before raw capture?
@@swplayer1111 death will kick your device off the network and then when you sniff, you want to capture the handshakes from the device actively reconnecting to that network.
How come when I run wireshark I get permission denied when trying to capture my own packets? Hopefully the same gentleman who sent me my Microsoft call center refund (it’s on the wire) will help me with my wireshark.
@@matthieuevin3585I did all the time
SKID. I'm assuming that's 'script kid'. Never heard that before. I like it.
For some reason I am unable to flash the SD_serial version onto my board. I can flash the non sd version using Frog's .bat file no problem. What am i doing wrong?
The file appears to be damaged or corrupt
(Commview: NCFX data length 0 < 20)
What to do ? I've dried Pcapfix but it claims that there ain't no data in that file while It does gain size, but Hexedit gives me nothing but 0's or windows notes shows me nothing but you can move your cursor so there is data there.. Blank file with size in it ?.
I guess that Im sniffing it wrong.
Found a fix?
@@georgekoumanos8621 Nope still asking around and looking but dice. I even tried Unleashed firmware and it did nothing.
Since Pcap fix and Wireshark claims it's corrupted I start to lean the blame on Maruder, I wonder if there is a config file that needs to change a setting. But I haven't had much time to find a solution.
Let me know if you figure something out =)
@@kapone2k Replied before with link to marauder release but maybe it got blocked? Reverted back to 0.10.5 version and managed to open new pcap files fine. They are actually ~5 times larger than previous "empty" ones. Now I get no eapol packets but I'll tackle this next. btw 0.10.5 is missing a lot of stuff so will keep an eye for future fix
everything works well, but when I start the hashcat program with the converted file, it never give me a password, if I try using a password list, the psw it's obviously noy in that list, but If I send it without a list, after a while it gives me this: No password candidates received in stdin mode, aborting
Can anyone provide a fix for the pcaps not storing on the Flipper SD card? I have all the Flipper firmware updates, flashed the esp, and can successfully pull of the deauth. I select and see the packets coming through the devices, but my pcap files are always 0 bytes. I tried the recommended fixes in other forums, but the pcaps are always empty. Thanks.
Are you seeing EAPOL pop up in Marauder when you're sniffing PMKIDs?
no@@TalkingSasquach
@@TalkingSasquach yes, is that good or bad? Thanks for responding. 🙏🏼🙏🏼🙏🏼
How are you emulating the flipper zero on your screen to record it?
Just using QFlipper
How do I do this on a Mac?
I downloaded wireshark and saved the file. But from that point on I can’t use the commands used in the video as I’m not using a windows machine at the moment
Another great video for the FZ community, nice one bro 👌🏼
Thanks! Trying to keep up with all the great stuff coming out!
Really cool video but it hasn't worked for me on my home network. I have my phone connected to my ISP Wifi (I changed the SSID to run tests), ran the deauth attack before going to the sniff raw; my iPhone doesn't get disconnected and downloading the pcap file, it's got content but applying the eapol filter leads to an empty list. Could it be that my wifi router has a protection that prevents this ?
Note: I also tried to set up a wifi network without security but DeAuth doesn't work. I'm using my ISP Wifi as well as TP Link Deco.
I'm having the same issue. if you find a fix could you update me
I’m on Mac computer, I’ve installed Wireshark, but what do to with part where you’re using cmd and Windows? How to do that same thing with MacOS?
Mimicked step zero, but it did not work. Looks exactly like your Powershell cmd lines. error i got "pip3 : Ther Term 'pip3' is not recognized as the name of a cmdlet, function, script file, or operable program. Help!
im having trouble installing the prerequisites. i copy the line to powershell and it tells me that the term "pip3" is not recognized
I had the same problem but another comment was able to guide me. First thing to do is watch the first video in the series. It's only like 3 minutes and it fixed my step zero issue.
Will it work on change traffic light from red to green light than wait for green light to go?
I'm Probably doing something wrong but I cant do the "step 0" as PowerShell does not recognize the "pip3" as a command. Any suggestions?
Same
Same here
Same can't get pass the "pip3" command
someone please help us
In addition to my previous comment, you need to make sure you downloaded The Marauder flash to your documents folder. For some reason python can’t view files that are in the downloads folder, so when you run step zero it will return an error. I just spent hours trying to figure this out and it finally worked 😂
Followed your guiding, but i did't get any EAPOL Messages in my raw pcap when i analyse them in wireshark.. any idea?
I had to keep disconnecting and reconnecting my phone and laptop to capture them.
excellent! the .pcap file doesn't appear in the pcaps folder, any ideas?
Your WiFi board sounds like it doesn't have the right firmware
@@TalkingSasquach thanks bro, i must have done something wrong
also check the application itself on the bottom of the wifi marauder was an option to save files to my SD card , I didn't realize it was there and was having the same problem. As soon as I allowed it to save to the SD card pcap files were in the folder
@@brianreip411 This should be pinned.
@@brianreip411 Thanks bro, I checked what you mentioned and you were right, but I still have the error. I probably made an error while installing something, but I haven't gotten around to fixing it. Thank you so much!
Step 4 doesn’t work for me. Is there an alternative?
No module name ‘git’
did you figure out an answer to this? im having the same issue
@@asilverplatypus same did you find
Files sniffraw_0.pcap after scan raw 0 byte , why ?
Yes
@@colewelfringer2925 what "Yes" ? Why ?
What do you recommend? DarkFlipper or RogueMaster?
They're both good but I usually end up with RogueMaster
Good video. The only question I have, is why are you using Windows?
That's what most of my viewers are running
what color should the wifi board LED be when plugging in? it only seems to connect when its red but it's unable to get most of the marauder data when i try to flash it onto the board
If I type eapol it just shows nothing
Same
What should I choose if I don't have an option with an SD card
Not working Windows power Shell sad cd cannot find driver. A driver with the name OC does not exist
There's a much newer version of this video that makes it easier!
There is no option for flashing to SD card in new version. Did I miss something here, or is that not an option anymore?
Hi Sasquach, when I try to flash I recieve this error: Cannot configure port, something went wrong. Original message: OSError(22, 'A device which does not exist was specified.', None, 433)
Unable to erase the firmware on esp32s2
Same error
Anyone got a fix for this issue?
Do you think I’m having trouble with is for some reason I can’t get any Pcaps or they’re not showing up in wire shark
Hello can someone please help me find out this issue I've watched countless videos and none have worked my problem is that for step 5 it says my esp 32 wifi dev board isn't recognized I even installed the universal drivers still didn't work.
I tried this on WPA/WPA2 wifi but WireShark showing blank on eapol. why is that?
Can you send me a link to the dictionary used in the video? thank you
Im new to flipper zero can i use multiple password lists or does it not work?
Anybody know why I can’t capture the handshake it’s on the 2.4 band
install XFW and install marauder to the wifi board through ESP Flasher, then try again. New WiFi hacking video coming up SOON
Wha would happen if our password doesn't contain in that password list? Hashcat wouldn't able to decrypt with handshake pcap file?
Hello everyone, little help needed here. I am following the steps carefully but all my pcap files are empty 0 octet. Is someone there able to point me on how to fix my issue? Regards!
You most likely have the incorrect firmware on your WiFi board.
@@TalkingSasquach hello, thanks, you are correct, i have installed the sd cersion of fw and now itnis working properly. Cheers and awesome job!!
Wait, the whole process only works if I have a common password?! So it won't work if for example I use my own invention which is a nickname from X book protagonist I invented myself, in l33t and special symbols? Basically this just works for boomer passwords, easy passwords and provider default passwords?
I’m really interested in Flipper and everything it can do but I don’t understand anything about what I just saw or what it is. Where do you suggest I can learn what all of this stuff means for someone interested in learning computer tech, programming and whatever else this is? Thanks for any and all help!
Watch the rest of my videos!
@@TalkingSasquach Will do but I don’t quite understand them. But I will. Thanks 🤙
why are all my pcaps are zero filesize
Same issue
If we feed the passwords to software then what kind of hacking it is. I am so dumb in this. Kindly educate me
Not clear for me what moment of the video you stract the password of the wifi network, i have read many post and all of them agree that is not possible to hack wifi passwords with flipper zero.
I want to know if you can extract any wifi password with this device its or not possible to do?
I can get all the way to the command prompt no problem, then my ignorance takes over. i feel like im following your instructions to the letter, but always get the error "cannot find the drive specified" Any help for a novice on this part?
I installed wireshark but whenever i drag my pcap files into it im left with a blank screen. Do you have any idea what Im doing wrong?
Instead of using a PC, is there a way to do this password process using your cell phone? some app or something like that
Where I can find cracked file (password list), because in the description the files are not available, please someone help me
Dose it make change on what version Maruder is running? I made many redowlands and this still dosnt work
When i drag the pcap file to wireshark it does nothing. Do i have something set wrong?
So my pcap files are empty there not downloading
Can we able to get the handshake file for WPA2/Enterprise corporate wifi?
Hello and thank you for the hard work you put for us. I have failed to actually get it work before your guide. Do you have another link of the Delilah's huge password list? The link is not working.
will this also work for pwnagotchi handshakes? or is there a separate video for that?
i keep getting this error when i try to boot the flasher into the wifi kit "Cannot configure port, something went wrong. Original message: PermissionError(13, 'A device attached to the system is not functioning.', None, 31)
Unable to erase the firmware"
Someone help me understand why you don’t want to download source code? Does it cause issues?
Source code is uncompiled, so it's of no use unless you want to change things and compile it yourself
What is the deauth time for sniff raw? For me it doesn't show eapol
Whats the best software to download on your Dev board.
Hey Squanch, if the password is NOT in the list, i.e you're doing this with a password set up when youre native language is not english? is this password list truly needed or not?
Wait, so it has to be a common password? Meaning that mine can't be cracked? I use 3 initials of 3 different words in which one is a made up word, mashed together in l33t
My flipper has the same custom firmware RM and it is the latest firmware, the flash of the dev board to make it do the WIFI marauder works but I just can't get it to deauthorize the WIFI I selected. I'm wondering in this video did you set up a router to make it able to deauthorize because doing some research it says you can't deauthorize a router that has 5ghz is not able to do this attack but some 2.4ghz will. I'm just super confused and any help would be great.