A repeater companion node for the esp-phisher project.
This ESP32-based device clones the strongest nearby open Wi-Fi SSID and redirects all DNS traffic to the main captive portal server at 192.168.4.1
.
esp-phisher-node is an educational tool created to demonstrate the risks of connecting to open Wi-Fi networks and blindly trusting captive portals. It helps extend the reach of a primary phishing AP by repeating the SSID and redirecting clients.
- Scans and clones the strongest open SSID
- Creates a fake AP using the cloned name
- Redirects all DNS traffic to the main captive portal (e.g.,
192.168.4.1/index.html
) - Supports captive portal auto-launch on most devices
- LED indicators:
LED_PWR
(GPIO 14): Always ON when poweredLED_TX
(GPIO 12): Solid ON when a client connects
This tool is meant for:
- Red team demos
- Ethical hacking research
- Wi-Fi security awareness
- DEFCON-style experiments
-
Flash using Arduino IDE or PlatformIO
-
Board:
ESP32 Dev Module
-
Wiring:
LED_PWR
→ GPIO 14LED_TX
→ GPIO 12
-
Power via USB or 5V to VIN
- The ESP32 scans for nearby open networks
- It clones the strongest SSID found
- Starts a fake AP using that SSID
- All DNS traffic is redirected to
192.168.4.1
- The main
esp-phisher
handles web content and logging