Skip to content

Commit 2744493

Browse files
committed
Release 2.5.1
Requires updating both the 32u4 sketch and the ESP sketch. Add a serial link to allow issuing commands from the 32u4 back to the ESP8266, this may be utilized more in future releases. Add the ability to set an open network via serial for devices that have trouble connecting to a secured ESP8266 access point (rare cases). This makes it easier for the new users who experience this rare issue to get started using their device.
1 parent 3cb769a commit 2744493

File tree

6 files changed

+24
-9
lines changed

6 files changed

+24
-9
lines changed

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,8 @@ Connect to the Access Point with the SSID "Exploit" with a password of "DotAgenc
9797
Open a web browser pointed to "http://192.168.1.1"
9898
The default administration username is "admin" and password "hacktheplanet".
9999

100+
NOTE: Certain devices seem to have trouble connecting to a password protected ESP8266 access point. The symptoms of this involve repeatedly being prompted to enter the password and being unable to connect to the ESP8266 via WiFi. This can be solved by following the above instructions but instead issuing the command "ResetDefaultConfig:OpenNetwork" via serial. The device will be restored to the factory defaults(with the exception of now being an unsecured network). The device will reboot and you may now connect to it as an unsecured WiFi access point with an SSID of "Exploit". You should now be able to establish a connection.
101+
100102
-----
101103
Configure ESPloit
102104
-----

source/Arduino_32u4_Code/Arduino_32u4_Code.ino

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@
4040
//Prints debug lines via serial if set to 1
4141
//const int debug=0;
4242

43-
String version = "2.1";
43+
String version = "2.2";
4444

4545
//Used later for determining if we are ready to release a key press or a combination of key presses
4646
int keypressdone=0;
@@ -65,11 +65,9 @@ void setup() {
6565
void loop() {
6666
// while (SOFTserial.available()) {
6767
while (Serial.available()) {
68-
String cmd1 = Serial.readStringUntil(':');
69-
if(cmd1 == "ResetDefaultConfig"){
70-
Serial1.println("ResetDefaultConfig:");
71-
Serial.println("Resetting configuration files back to default settings.");
72-
}
68+
String serial_link = Serial.readStringUntil('\n');
69+
Serial1.println(serial_link);
70+
Serial.println("Relaying command to connected ESP device.");
7371
}
7472
while (Serial1.available()) {
7573
// String cmd = SOFTserial.readStringUntil(':');

source/ESP_Code/ESP_Code.ino

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,7 @@ int DelayLength;
100100
int livepayloaddelay;
101101
int autopwn;
102102
char autopayload[64];
103+
int open_network=0;
103104

104105
void runpayload() {
105106
File f = SPIFFS.open(autopayload, "r");
@@ -361,7 +362,12 @@ bool loadDefaults() {
361362
json["version"] = version;
362363
json["accesspointmode"] = "1";
363364
json["ssid"] = "Exploit";
364-
json["password"] = "DotAgency";
365+
if(open_network==0){
366+
json["password"] = "DotAgency";
367+
}
368+
else if(open_network==1){
369+
json["password"] = "";
370+
}
365371
json["channel"] = "6";
366372
json["hidden"] = "0";
367373
json["local_IP"] = "192.168.1.1";
@@ -1103,6 +1109,13 @@ void loop() {
11031109
while (Serial.available()) {
11041110
String cmd = Serial.readStringUntil(':');
11051111
if(cmd == "ResetDefaultConfig"){
1112+
String RSDC = Serial.readStringUntil('\n');
1113+
if(RSDC.indexOf("OpenNetwork") >=0) {
1114+
open_network=1;
1115+
}
1116+
else {
1117+
open_network=0;
1118+
}
11061119
loadDefaults();
11071120
ESP.restart();
11081121
}
752 Bytes
Binary file not shown.

source/ESP_Code/HelpText.h

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,8 @@ Connect to the Access Point with the SSID "Exploit" with a password of "DotAgenc
100100
Open a web browser pointed to "http://192.168.1.1"<br>
101101
The default administration username is "admin" and password "hacktheplanet".<br>
102102
<br>
103+
NOTE: Certain devices seem to have trouble connecting to a password protected ESP8266 access point. The symptoms of this involve repeatedly being prompted to enter the password and being unable to connect to the ESP8266 via WiFi. This can be solved by following the above instructions but instead issuing the command "ResetDefaultConfig:OpenNetwork" via serial. The device will be restored to the factory defaults(with the exception of now being an unsecured network). The device will reboot and you may now connect to it as an unsecured WiFi access point with an SSID of "Exploit". You should now be able to establish a connection.<br>
104+
<br>
103105
-----<br>
104106
Configure ESPloit<br>
105107
-----<br>

source/ESP_Code/version.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
String version = "2.5.0";
2-
String latestardversion = "2.1";
1+
String version = "2.5.1";
2+
String latestardversion = "2.2";

0 commit comments

Comments
 (0)