|Difference||Deauther Watch SE||Deauther Watch V3||Deauther Watch V4|
|3D Print Case||YES||YES||YES|
|Battery Life Indicate||NO||YES||YES|
|Strap||Soft sillica gel||Nylon||Soft sillica gel|
What is it?
Deauther watch SE has redesigned surface and circuit. RTC could work for several months after you turn off the watch. You can also flash deauth detector software because it has buzzer now.
Deauther Watch is still an ESP8266 development board, but you can wear it like a smartwatch.
It comes installed with the latest ESP8266 Deauther software. With this software, you can perform different attacks to test WiFi networks.
Please note that the ESP8266 does only support 2.4GHz.
You can also use it to develop your own software. It is simple to use, just like any other ESP8266 development board.
- Deauther Attack: Disconnect 2.4G WiFi
- Deauther Beacon: Create fake networks
- Deauther Probe：Confuse wifi trackers
- Packet Monitor：Display wifi traffic
GPIOs and Hardware info
- Display: SH1106 1.3" OLED
- Display SDA: GPIO 5
- Display SCL/SCK: GPIO 4
- WS2812b LED: GPIO 15
- Button Up: GPIO 12
- Button Down: GPIO 13
- Button Select: GPIO 14
- Buzzer: GPIO 0
- Side Button: RST
Why did you make it?
I designed this development board especially for Spacehuhn's great project: ESP8266 Deauther. It has been authorized by him and is officially supported.
Thanks to every customer that leaves feedback! I will keep improving this board.
What makes it special?
- Double Arcylic Protection
- Transparent Case
- Soft sillica gel strap
- 500 mA charging current
- Indicate charging LED (RED will turn off when full)
- ESP12F Inside
- Power Switch
- Protection: short, overcharging, over discharging, temperature
This project is a proof of concept for testing and educational purposes. Neither the ESP8266, nor its SDK was meant or built for such purposes. Bugs can occur!
Use it only against your own networks and devices! Please check the legal regulations in your country before using it. We don't take any responsibility for what you do with this program.
Closes the connection of WiFi devices by sending deauthentication frames to access points and client devices you selected. This is only possible because a lot of devices don't use the 802.11w-2009 standard that offers a protection against this attack. Please only select one target! When you select multiple targets that run on different channels and start the attack, it will quickly switch between those channels and you have no chance to reconnect to the access point that hosts this web interface.
Beacon packets are used to advertise access points. By continuously sending beacon packets out, it will look like you created new WiFi networks. You can specify the network names under SSIDs.
Probe requests are sent by client devices to ask if a known network is nearby. Use this attack to confuse WiFi trackers by asking for networks that you specified in the SSID list. It's unlikely you will see any impact by this attack with your home network.