back

Liberating Wi-Fi on the ESP32

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:39:40
Language
English
Abstract
Reverse engineering the Wi-Fi peripheral of the ESP32 to build an open source Wi-Fi stack.

During the 38c3, there are probably multiple thousands of ESP32s in the CCH, all of which run a closed source Wi-Fi stack. And while that stack works, it would be nicer to have an open source stack, which would grant us the ability to modify and audit the software, which carries potentially sensitive data.



So we set to work, reverse engineering the proprietary stack and building a new open source one. We soon discovered just how versatile the ESP32 can be, both as a tool for research and IoT SoC, when its capabilities are fully unlocked. This includes using it as a pentesting tool, a B.A.T.M.A.N. mesh router or an AirDrop client.



You'll learn something about Wi-Fi, the ESP32, reverse engineering in general and how to approach such a project.

Talk ID
38c3-226
Event:
38c3
Day
1
Room
Saal 1
Start
12:55 p.m.
Duration
00:40:00
Track
Hardware & Making
Type of
other
Speaker
Frostie314159
Jasper Devreker
Talk Slug & media link
38c3-liberating-wi-fi-on-the-esp32
English
0.0% Checking done0.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
100.0% Nothing done yet100.0%

Work on this video on Amara!

English: Transcribed until

Last revision: 2 months, 3 weeks ago