Marauder Workflows - FZEEFlasher/fzeeflasher.github.io GitHub Wiki
(Work In Progress)
This attack is intended to target only specific stations connected to a targeted access point rather than sending deauth frames to broadcast. Multiple stations and access points can be specified for a single attack. While it is possible to select many stations even when they are associated with different access points, only selected stations associated with selected access points will be targeted. If a station is selected but its associated access point is not, it will not be attacked.
The following describes the order of operations necessary to properly execute this attack.
- Build list of target access points
- Display list of available access points
- Select a target access points from the list. Multiple access points may be specified
- Verify access points 0 and 1 have been selected with list
- Build list of target stations
- Display list of available stations
- Select target stations from the list. Multiple stations may be specified
- Execute deauthentication flood against the targeted access points
The following describes the process for configuring and executing Marauder Evil Portal with Flipper Zero.
- Open ESP32 WiFi Marauder app
- Go to SSID and change it to
- Add the name you wish after the "ssid -a -n" then save
- Go back to main menu and got to load evil portal HTML file
- Browse to your saved html files and select the html you want to use.
- You will get a screen that shows html set.
- Back to the menu
- Go the evil portal option and start.
- At this point you should find the SSID that you set in step 3 on wireless networks and attaching to it should open the portal you set in step 5
- In order to change the name of the SSID you will need to remove it SSID you may need to do this a few times as its stacks them sometimes
- Make sure you are on the latest marauder firmware and companion app if you are on a custom firmware check what they support.