Skip to content

0adri3n/esp32fake_hotspot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ESP32-S3 Fake WiFi Captive Portal

⚠️ Educational & Research Project Only

This project demonstrates how WiFi captive portals operate, using an ESP32-S3. It is intended for learning, demos, and security awareness only.


📸 Screenshots

image image image

🚀 Features

  • WiFi Access Point (ESP32-S3)
  • Captive Portal auto-detection (Android / iOS / Windows / Linux)
  • DNS wildcard redirection
  • Fake "Free WiFi" login page
  • Local logging using LittleFS
  • Hidden admin panel to view logs
  • On-device log rotation

📡 Captive Portal Flow

  1. User connects to ESP32 WiFi
  2. DNS resolves all domains to ESP32
  3. System detects captive portal
  4. Fake login page is displayed
  5. User submits form
  6. Connection details are logged

📂 Logged Information

Each connection records:

  • Timestamp (uptime seconds)
  • Name
  • Email
  • Password
  • Client IP address
  • User-Agent (OS / browser)
  • Platform
  • Vendor

Example log entry

64 | name=ad | email=0adri3n@github.com | password=fakehaha | userAgent=Mozilla/5.0 (iPhone; CPU iPhone OS 18_7 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E148 | platform=iPhone | vendor=Apple Computer, Inc. | ip=192.168.4.2

🛠 File System (LittleFS)

File Description
/connections.log Connection logs
Auto-rotation File cleared when > 50 KB

🔐 Admin Panel (Hidden)

A secret admin page allows viewing logs directly from a browser.

http://192.168.4.1/admin-9f3a2c

Admin features

  • View logs in real time
  • Monospace readable UI
  • Not indexed or linked anywhere

⚙️ Hardware

  • ESP32-S3 (dual-core 240 MHz)
  • 8 MB PSRAM
  • 16 MB Flash
  • USB or Li-ion battery powered

📦 Ordered on AliExpress here. This is NOT sponsored.


🧰 Software

  • Arduino IDE
  • ESP32 Arduino Core (recommended 2.0.17)
  • Libraries:
    • WiFi
    • DNSServer
    • WebServer
    • LittleFS

⚠️ Legal Disclaimer

This project:

  • Is NOT a hacking tool
  • Must not be used on public or private networks without permission
  • Is for educational and testing environments only

You are responsible for compliance with local laws.


🧠 Future Improvements

  • Admin authentication
  • CSV export
  • Log pagination
  • NTP timestamp
  • MAC address
  • HTTPS captive portal
  • TFT admin dashboard

About

Deploy a fake WiFi hotspot with a captive portal on ESP32S3.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Contributors

Languages