Liberating Wi-Fi on the ESP32

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
Not yet available
Language
English
Abstract
Reverse engineering the Wi-Fi peripheral of the ESP32 to build an open source Wi-Fi stack.

During the 38c3, there are probably multiple thousands of ESP32s in the CCH, all of which run a closed source Wi-Fi stack. And while that stack works, it would be nicer to have an open source stack, which would grant us the ability to modify and audit the software, which carries potentially sensitive data.

So we set to work, reverse engineering the proprietary stack and building a new open source one. We soon discovered just how versatile the ESP32 can be, both as a tool for research and IoT SoC, when its capabilities are fully unlocked. This includes using it as a pentesting tool, a B.A.T.M.A.N. mesh router or an AirDrop client.

You'll learn something about Wi-Fi, the ESP32, reverse engineering in general and how to approach such a project.

Talk ID
38c3-226
Event:
38c3
Day
1
Room
Saal 1
Start
12:55 p.m.
Duration
00:40:00
Track
Hardware & Making
Type of
Talk
Speaker
Frostie314159
Jasper Devreker
Frostie314159
Jasper Devreker
Talk Slug & media link
38c3-226-liberating-wi-fi-on-the-esp32

The video is not yet available