DSTIK WiFi Deauther Watch SE ESP8266 Programmable Development Board | RTC & Deauth Detector | Attack/Control/Test Tool
Physical photos taken
Guarantee absolute quality, no reason to return and replace dissatisfied, while ensuring the fastest logistics, the same day delivery
What is it?
Deauther watch SE has redesigned surface and circuit. RTC could work for several months after you turn off the watch. You can also flash deauth detector software because it has buzzer now.
Deauther Watch is still an ESP8266 development board, but you can wear it like a smartwatch.
It comes installed with the latest ESP8266 Deauther software. With this software, you can perform different attacks to test WiFi networks.
Please note that the ESP8266 does only support 2.4GHz.
You can also use it to develop your own software. It is simple to use, just like any other ESP8266 development board.
GPIOs and Hardware info
Why did you make it?
I designed this development board especially for Spacehuhn’s great project:ESP8266 Deauther. It has been authorized by him and is officially supported.
Thanks to every customer that leaves feedback! I will keep improving this board.
What makes it special?
This project is a proof of concept for testing and educational purposes. Neither the ESP8266, nor its SDK was meant or built for such purposes. Bugs can occur!
Use it only against your own networks and devices! Please check the legal regulations in your country before using it. We don’t take any responsibility for what you do with this program.
Closes the connection of WiFi devices by sending deauthentication frames to access points and client devices you selected. This is only possible because a lot of devices don’t use the 802.11w-2009 standard that offers a protection against this attack. Please only select one target! When you select multiple targets that run on different channels and start the attack, it will quickly switch between those channels and you have no chance to reconnect to the access point that hosts this web interface.
Beacon packets are used to advertise access points. By continuously sending beacon packets out, it will look like you created new WiFi networks. You can specify the network names under SSIDs.
Probe requests are sent by client devices to ask if a known network is nearby. Use this attack to confuse WiFi trackers by asking for networks that you specified in the SSID list. It’s unlikely you will see any impact by this attack with your home network.