completed
Flipper Zero Wi-Fi Attack Analysis
WPA2 deauth + Evil Twin attacks with a $200 pocket device
University of Akron CIS senior capstone. Demonstrated two wireless attack vectors against WPA2-Personal networks using a Flipper Zero with ESP32 Wi-Fi Dev Board (Marauder firmware): a deauthentication handshake capture cracked offline with Hashcat on a GPU-accelerated Parrot OS VM, and an Evil Twin captive portal harvesting credentials through spoofed Apple, Starbucks, and TP-Link login pages. Verified mitigations including WPA3-Personal (fully blocks hash extraction), strong passphrases, and user awareness.
SecurityWi-FiPentestingFlipper Zero