EAPOL Capture
Captures WPA2 4-way handshakes from nearby networks and saves them as PCAP files for offline cracking.
Setup
- Go to WiFi > EAPOL Capture
- Configure settings before starting:
- Discovery Dwell — Time spent per channel during scanning to discover SSID and BSSID (250–10000 ms, default 500)
- Attack Dwell — Time spent on a channel after sending deauth to get EAPOL (250–10000 ms, default 6000)
- Max Deauth — Maximum deauth attempts per AP before rescanning (5–30, default 20)
- Start — Begins the capture
How It Works
- Discovery phase — Scans all 13 channels to discover APs and collect beacon frames
- Attack phase — Sends deauth bursts to discovered APs to force clients to reconnect, capturing the EAPOL handshake during reconnection
- The deauth log shows progress as
[current/max](e.g.,Deauth CH6 (2 AP) [3/20]) - When all APs are either captured or reach the max deauth limit, incomplete APs are reset and discovery restarts
- Validated handshakes (beacon + M1 + M2) are saved as PCAP files to
/unigeek/wifi/eapol/
Status Bar
- Left — Number of confirmed handshakes captured
- Right — Name of the last AP with EAPOL activity
Notes
- Requires storage (SD or LittleFS) with at least 20KB free space
- Cannot run simultaneously with other WiFi features (Evil Twin, Karma, etc.) since they share the radio
- Press BACK to stop and return to the WiFi menu
EAPOL Brute Force
Cracks WPA2 passwords offline from previously captured handshake PCAP files using dual-core parallel processing.
Setup
- Go to WiFi > EAPOL Brute Force
- Select a PCAP file from
/unigeek/wifi/eapol/ - Choose a wordlist:
- Built-in test (
__test__) — 110 common passwords (numeric, keyboard patterns, router defaults) - Custom wordlist — Select a file from
/unigeek/utility/passwords/(one password per line, 8–63 chars)
- Built-in test (
How It Works
- Passwords are tested on both CPU cores simultaneously for maximum speed
- Core 0 reads passwords and feeds them to core 1 via a FreeRTOS queue
- When the queue is full, core 0 cracks passwords itself instead of waiting
- Progress is shown as a percentage with the current password being tested
- If the password is found, it is saved alongside the PCAP file
Notes
- Only WPA2-PSK handshakes with valid M1+M2 pairs are crackable
- Passwords must be 8–63 characters (WPA2 specification)
- Cracking speed depends on the ESP32 variant
