Evaluating the ESP32-S3 for Wi-Fi Penetration Testing Through the Development of Deauther32 and HackHeld32
Abstract
1. Introduction
1.1. Goals and Scope
- Developing a hardware prototype to explore the advantages of newer hardware for portable Wi-Fi security testing.
- Implementing core functionalities essential for Wi-Fi hacking, such as capturing and sending Wi-Fi frames, to evaluate the hardware’s suitability.
- Creating a Deauther32 firmware prototype to test the feasibility of an ESP32-based successor to the ESP8266 Deauther.
1.2. Requirements
- Compact handheld form factor, not bigger than or comparable to a smartphone.
- Ability to run on battery power for over one hour.
- Hardware components that are widely available and simple to assemble, even for non-experts.
- Affordable price to ensure accessibility for hobbyists and DIY enthusiasts, ideally under 50 €.
- Sending custom Wi-Fi frames (packet injection).
- Capturing Wi-Fi frames (monitor mode).
- Signal range sufficient to target nearby devices reliably, typically within the same room or 10 m.
- Intuitive User Interface (UI) that is easy to navigate.
- Simple and beginner-friendly installation and setup process.
- Support for custom “apps” to expand functionality.
1.3. Approach
1.4. Key Contributions
- Integrated Handheld ESP32-S3 Platform: A compact, DIY-friendly handheld device was designed with a colour LCD, microSD card slot, and optional hardware extensions. Unlike existing ESP32-based tools, which are web- or command-line-based, HackHeld32 is a fully integrated, standalone handheld for Wi-Fi security testing, tackling critical usability gaps identified in prior work.
- GUI-Driven Deauther32 Firmware: A modern Graphical User Interface (GUI)-based firmware prototype was created as a practical successor to the ESP8266 Deauther, enabling true standalone operation without requiring a computer or smartphone. This represents a paradigm shift from existing ESP32 tools toward a handheld-first design.
- Low-Level Frame Capture and Injection Workarounds: Custom firmware techniques were developed to overcome the ESP32-S3’s hardware limitations in frame capture and injection, enabling capabilities that are not advertised by the manufacturer.
- Comprehensive Comparative Evaluation: Range tests, throughput analysis, and direct performance comparisons with professional tools (Wi-Fi Pineapple, Kali Linux) demonstrate that the ESP32-S3-based platform is viable for focused network analysis tasks despite hardware constraints—a finding that establishes practical viability.
- On-Device Firmware Management: A custom bootloader and app manager were implemented, enabling users to install and manage applications without a computer—a novel accessibility feature that differentiates this work and supports its accessibility argument.
- Affordability and Accessibility: The project balanced cost and functionality, making the HackHeld32 and Deauther32 accessible to hobbyists and DIY enthusiasts while ensuring expandability and ease of use.
2. Fundamentals
2.1. Wi-Fi Standard
- Management frames handle network management tasks such as connecting, authenticating, and maintaining the connection.
- Control frames coordinate data transmissions, such as acknowledgment (ACK) and request-to-send (RTS) signals.
- Data frames carry the payload between devices, typically containing packets from higher-layer protocols.
2.2. Wi-Fi Security and Vulnerabilities
- Deauthentication and Disassociation Attacks: Attackers spoof management frames to disconnect devices from the network.
- Rogue APs and Evil Twin Attacks: A malicious AP is set up for Man-in-the-Middle (MiTM) attacks or phishing; an evil twin clones a legitimate AP to deceive users into connecting.
- MAC Address Spoofing: Networks that rely on MAC-based access control are vulnerable to attackers spoofing an authorised device’s address to gain access.
2.3. Hacking and Penetration Testing
2.4. Tools for Wi-Fi Hacking
3. Related Work
3.1. Wi-Fi Hacking with Linux
3.2. Wi-Fi Hacking with Microcontrollers
3.3. Hacking with Microcontrollers Beyond Wi-Fi Applications
3.4. Differentiation from Existing ESP32 Tools
- Interface limitation: Existing tools rely on web-based or command-line interfaces, requiring a separate device (phone, laptop, or tablet) to operate, limiting practical deployment scenarios.
- Form factor: No existing ESP32 tool integrates hardware and firmware into a unified, truly standalone handheld device with native display and input controls.
- Accessibility: Installation and operation typically require setting up a development environment, which creates a barrier to entry for hobbyists and educational use.
- Hardware utilisation: Prior work does not fully exploit the ESP32-S3’s frame injection and capture capabilities, leaving performance and reliability gaps unaddressed.
3.5. Wi-Fi Hacking with Single-Board Computers
4. Hardware Development
4.1. Parts and Components for the HackHeld32
4.2. HackHeld32 PCB Design
4.3. HackHeld32 Case Design
4.4. Resulting Hardware
5. Firmware Development
- TaskScheduler (https://github.com/arkhipenko/TaskScheduler, accessed on 15 May 2026) for managing recurring tasks.
- LVGL (https://github.com/lvgl/lvgl, accessed on 15 May 2026) for creating the GUI.
- Adafruit_GFX (https://github.com/adafruit/Adafruit-GFX-Library, accessed on 15 May 2026) and Adafruit_ST7789 (https://github.com/adafruit/Adafruit-ST7735-Library, accessed on 15 May 2026) for interfacing with the screen.
- Adafruit_NeoPixel (https://github.com/adafruit/Adafruit_NeoPixel, accessed on 15 May 2026) for controlling LEDs.
- TinyGPSPlus (https://github.com/mikalhart/TinyGPSPlus, accessed on 15 May 2026) for parsing GPS data.
- ArduinoJson (https://github.com/bblanchon/ArduinoJson, accessed on 15 May 2026) for working with JSON data.
5.1. Graphical User Interface (GUI)
5.2. Bootloader and App Manager
5.2.1. Partition Table and Bootloader
5.2.2. App Manager
6. Wi-Fi Sniffer Implementation
6.1. PktSnffr App Implementation
6.2. PktSnffr GUI
6.3. Capture Performance Evaluation
6.3.1. Low-Traffic Performance (Tests 1–6)
6.3.2. High-Traffic Performance (Tests 7–8)
6.3.3. Range Evaluation (Tests 9–10)
6.4. Limitations and Future Work
7. Packet Injection Implementation
7.1. ESP-IDF Constraints and Workaround
7.2. Beacon Flood Implementation
7.3. Deauthentication Attack Implementation
| Listing 1. Deauthentication Frame Structure. |
| data ={ /* 0 - 1 */ 0xC0, 0x00, // type, subtype c0: deauth (a0: disassociate) /* 2 - 3 */ 0x00, 0x00, // duration (SDK takes care of that) /* 4 - 9 */ 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, // receiver (target) /* 10 - 15 */ 0x00, 0xE0, 0x4B, 0x9B, 0xC8, 0x98, // source (ap) /* 16 - 21 */ 0x00, 0xE0, 0x4B, 0x9B, 0xC8, 0x98, // BSSID (ap) /* 22 - 23 */ 0x00, 0x00, // fragment & sequence number /* 24 - 25 */ 0x01, 0x00 // reason code (1 = unspecified reason) } |
7.4. Evaluating Sender Range
8. Deauther32 Prototype Development
8.1. Main Menu
8.2. AP Scanning
8.3. Packet Capture and Packet Graph
9. Conclusions and Outlook
9.1. Use Cases and Applications
9.2. Outlook
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| AP | Access Point |
| BSSID | Basic Service Set Identifier |
| DIY | Do-It-Yourself |
| DoS | Denial-of-Service |
| ESP-IDF | Espressif IoT Development Framework |
| GPIO | General-Purpose Input/Output |
| GUI | Graphical User Interface |
| MAC | Medium Access Control |
| MiTM | Man-in-the-Middle |
| PCB | Printed Circuit Board |
| RSSI | Received Signal Strength Indicator |
| SBC | Single-Board Computer |
| SSID | Service Set Identifier |
| STA | Station |
| UI | User Interface |
References
- Kremser, S. SpacehuhnTech/esp8266_deauther. GitHub Repository. 2024. Available online: https://github.com/SpacehuhnTech/esp8266_deauther (accessed on 15 May 2026).
- IEEE Std 802.11-2020; IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE: Piscataway, NJ, USA, 2021. [CrossRef]
- Lounis, K.; Ding, S.H.H.; Zulkernine, M. Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3. In Foundations and Practice of Security; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2022; pp. 235–252. [Google Scholar] [CrossRef]
- Lounis, K.; Zulkernine, M. Attacks and Defenses in Short-Range Wireless Technologies for IoT. IEEE Access 2020, 8, 88892–88932. [Google Scholar] [CrossRef]
- Santiago Laguna, J.R. Is Your Wi-Fi Really Protected? Technical Report; Polytechnic University of Puerto Rico: San Juan, PR, USA, 2021; Available online: https://prcr.cobimet.org/items/bc1161f3-a7c2-4247-a8ae-b30eb2800d7e (accessed on 15 May 2026).
- Olagunju, A.; Seedorf, T. Requirements for Secure Wireless Networks: An Analysis of the WEP and WPA with Aircrack-ng Suite. In Proceedings of the International Conference on Society and Information Technologies (ICSIT ’11), Orlando, FL, USA, 27–30 March 2011. [Google Scholar]
- Ali, A.B. Kali Pi—A Miniature Ultra-Portable Penetration Testing Device. J. Inf. Secur. 2025, 16, 101–113. [Google Scholar] [CrossRef]
- Schulz, M.; Wegemer, D.; Hollick, M. Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices. In Proceedings of the 11th Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH ’17), New York, NY, USA; Association for Computing Machinery: New York, NY, USA, 2017; pp. 59–66. [Google Scholar] [CrossRef]
- Gopal, S.R.; Prasanth, P.R.; Swamy, S.V.; Krishna, P.S.; Kumar, R.L. Deauthentication of IP Drones and Cameras that Operate on 802.11 WiFi Standards Using ESP8266. Int. J. Electron. Commun. Eng. Technol. 2019, 10, 23–30. [Google Scholar] [CrossRef]
- Risinek. ESP32 Wi-Fi Penetration Tool. GitHub Repository. 2021. Available online: https://github.com/risinek/esp32-wifi-penetration-tool (accessed on 15 May 2026).
- Stehlík, R. Wi-Fi Attacks Using ESP32. Excel@FIT Student Conference Submission. 2021. Available online: https://excel.fit.vutbr.cz/submissions/2021/048/48.pdf (accessed on 15 May 2026).
- Drăghici, B.G.; Dobre, A.E.; Jibotean, M.A.; Ionică, D.; Stan, O.P.; Miclea, L.C. Assessment of Deauthentication Threats in IoT: An Empirical Analysis of ESP8266 Deauther and Flipper Zero. In Proceedings of the 29th International Conference on System Theory, Control and Computing (ICSTCC); IEEE: Piscataway, NJ, USA, 2025; pp. 661–666. [Google Scholar] [CrossRef]
- Tiwari, H.; Tomar, A.; Patil, S.; Patil, S.; Gangane, J.; Kate, S. Slipper Zero: Exploring Wi-Fi Security Vulnerabilities and Attack Implementations on ESP32 Microcontrollers. In Proceedings of the Global Conference on Wireless and Optical Technologies (GCWOT); IEEE: Piscataway, NJ, USA, 2024; pp. 1–7. [Google Scholar] [CrossRef]
- Cayre, R.; Cauquil, D.; Francillon, A. ESPwn32: Hacking with ESP32 System-on-Chips. In Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 311–325. [Google Scholar] [CrossRef]
- de Antonio, G. IRREM: Infrared Reverse Engineering Multitool; Technical Report; Universidad Francisco de Vitoria: Madrid, Spain, 2020. [Google Scholar]
- Karystinos, E.; Andreatos, A.; Douligeris, C. Spyduino: Arduino as a HID Exploiting the BadUSB Vulnerability. In Proceedings of the 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece, May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 279–283. [Google Scholar] [CrossRef]
- Chen, K.; Mao, W.; Guo, J.; Mao, Z.; Gu, B. Threat Analysis of Portable Hack Tools from USB Storage Devices. In Proceedings of the IEEE International Conference on e-Business Engineering; IEEE: Piscataway, NJ, USA, 2010; pp. 322–326. [Google Scholar] [CrossRef]
- Terzidis, M.; Mengidis, N.; Rizos, G.; Mazi, M.S.; Milousi, K.; Voulgaridis, A.; Votis, K. Challenges in Medical Device Communication: A Review of Security and Privacy Concerns in Bluetooth Low Energy (BLE). In Proceedings of the 8th International Conference on Cyber-Technologies and Cyber Systems (CYBER 2023), Porto, Portugal, 25–29 September 2023. [Google Scholar]
- Winterer, F. Hotplug-Attack-Tools—Überblick und Vergleich Gängiger Tools; Technical Report; Hochschule Wismar: Wismar, Germany, 2023; Available online: https://it-forensik.fiw.hs-wismar.de/images/b/b8/Hotplug-Attacks.pdf (accessed on 15 May 2026).
- Al Neyadi, E.; Al Shehhi, S.; Al Shehhi, A.; Al Hashimi, N.; Qbea’H, M.; Alrabaee, S. Discovering Public Wi-Fi Vulnerabilities Using Raspberry pi and Kali Linux. In Proceedings of the 12th Annual Undergraduate Research Conference on Applied Computing (URC), April 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–4. [Google Scholar] [CrossRef]
- Nishitkumar, P.; Wimmer, H.; Powell, L.M. Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI. In Proceedings of the Conference on Information Systems Applied Research (CONISAR 2020); Information Systems and Computing Academic Professionals (ISCAP): Wrightsville Beach, NC, USA, 2020. [Google Scholar]
- de Graaf, D.; Brocken, T. Project Zonde 2IC80—Lab on Offensive Computer Security; Technical Report; Technical University of Eindhoven: Eindhoven, The Netherlands, 2018; Available online: https://www.studeersnel.nl/nl/document/technische-universiteit-eindhoven/lab-on-offensive-computer-security/example-of-project/4272830 (accessed on 15 May 2026).
- Kremser, S. HackHeld. Project Website. 2024. Available online: https://hackheld.spacehuhn.com/ (accessed on 15 May 2026).










































| Layer | Description | |
|---|---|---|
| 7 | Application | Data |
| 6 | Presentation | Data |
| 5 | Session | Data |
| 4 | Transport | Segments |
| 3 | Network | Packets |
| 2 | Data Link | Frames (802.11 MAC) |
| 1 | Physical | Bits (802.11 PHY) |
| Part | Quantity | Price (Total) |
|---|---|---|
| 1.54″LCD Screen | 1 | 3.05 € |
| Lolin S3 Mini Dev. Board | 1 | 7.09 € |
| GPS Module | 1 | 4.79 € |
| LED | 1 | 0.09 € |
| Buttons | 6 | 0.35 € |
| PCB | 1 | 4.15 € |
| Case (back + front) | 2 | 1.32 € |
| Screws | 4 | 0.04 € |
| Battery charging module | 1 | 3.00 € |
| LiPo Battery | 1 | 7.12 € |
| MicroSD Card | 1 | 4.09 € |
| Part | Quantity | Price (Total) |
|---|---|---|
| 1.54″ LCD Screen | 1 | 3.05 € |
| Lolin S3 Mini Dev. Board | 1 | 7.09 € |
| Buttons | 6 | 0.35 € |
| PCB | 1 | 4.15 € |
| Case (back) | 1 | 0.92 € |
| Screws | 4 | 0.04 € |
| Name | Type | SubType | Offset | Size |
|---|---|---|---|---|
| nvs | data | nvs | 0x9000 | 0x5000 |
| otadata | data | ota | 0xe000 | 0x2000 |
| UserApp | app | ota_0 | 0x10000 | 0x1E0000 |
| AppMngr | app | test | 0x1F0000 | 0x1E0000 |
| spiffs | data | spiffs | 0x3D0000 | 0x20000 |
| coredump | data | coredump | 0x3F0000 | 0x10000 |
| Card | 64 KB | 640 KB | 6400 KB |
|---|---|---|---|
| 8 GB Class 4 | 1.40 MB/s | 8.11 MB/s | 9.06 MB/s |
| 16 GB Class 4 | 1.11 MB/s | 5.43 MB/s | 2.90 MB/s |
| 16 GB Class 10 | 4.04 MB/s | 8.29 MB/s | 9.15 MB/s |
| Amazon Basics 128 GB V30 U3 A2 | 8.86 MB/s | 12.45 MB/s | 12.71 MB/s |
| Kioxia 64 GB U1 | 9.11 MB/s | 14.86 MB/s | 15.26 MB/s |
| Lexar 633x 128 GB V30 U3 A1 | 8.89 MB/s | 11.87 MB/s | 12.07 MB/s |
| Paradise 8 GB Class 4 | 2.17 MB/s | 4.26 MB/s | 3.05 MB/s |
| Samsung EVO 64 GB U1 | 5.53 MB/s | 8.40 MB/s | 7.93 MB/s |
| Samsung EVO Plus 64 GB U3 | 6.27 MB/s | 10.46 MB/s | 10.56 MB/s |
| Samsung EVO Select 128 GB V30 U3 A2 | 2.60 MB/s | 7.23 MB/s | 8.09 MB/s |
| Sandisk 16 GB Class 10 U1 | 0.34 MB/s | 2.84 MB/s | 11.02 MB/s |
| Sandisk 32 GB Class 10 U1 | 6.74 MB/s | 8.98 MB/s | 9.38 MB/s |
| Sandisk Extreme 32 GB V30 U3 A1 | 3.03 MB/s | 4.97 MB/s | 7.50 MB/s |
| Sandisk Extreme 64 GB V30 U3 A2 | 6.25 MB/s | 11.95 MB/s | 12.10 MB/s |
| Sandisk Extreme 128 GB V30 U3 A2 | 4.42 MB/s | 9.45 MB/s | 10.32 MB/s |
| Sandisk Extreme Pro 32 GB V30 U3 A1 | 6.13 MB/s | 10.55 MB/s | 12.00 MB/s |
| Sandisk Extreme Pro 64 GB V30 U3 A2 | 3.63 MB/s | 8.57 MB/s | 9.62 MB/s |
| Sandisk High Endurance 32 GB V30 U3 | 4.37 MB/s | 7.15 MB/s | 8.26 MB/s |
| Sandisk High Endurance 64 GB V30 U3 | 3.62 MB/s | 8.54 MB/s | 9.10 MB/s |
| Sandisk Ultra 16 GB Class 10 A1 | 3.71 MB/s | 4.32 MB/s | 3.27 MB/s |
| Sandisk Ultra 32 GB Class 10 A1 U1 | 1.81 MB/s | 8.27 MB/s | 8.98 MB/s |
| Toshiba 4GB Class 4 | 0.16 MB/s | 1.33 MB/s | 4.50 MB/s |
| Transcend 16 GB Class 2 | 0.78 MB/s | 7.60 MB/s | 10.06 MB/s |
| Transcend Premium 400× 8 GB U1 | 3.46 MB/s | 7.03 MB/s | 7.12 MB/s |
| Verbatim Pro 32 GB Class 10 V30 U3 | 6.69 MB/s | 12.61 MB/s | 13.20 MB/s |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Kremser, S.; Graffi, K. Evaluating the ESP32-S3 for Wi-Fi Penetration Testing Through the Development of Deauther32 and HackHeld32. Sensors 2026, 26, 3287. https://doi.org/10.3390/s26113287
Kremser S, Graffi K. Evaluating the ESP32-S3 for Wi-Fi Penetration Testing Through the Development of Deauther32 and HackHeld32. Sensors. 2026; 26(11):3287. https://doi.org/10.3390/s26113287
Chicago/Turabian StyleKremser, Stefan, and Kalman Graffi. 2026. "Evaluating the ESP32-S3 for Wi-Fi Penetration Testing Through the Development of Deauther32 and HackHeld32" Sensors 26, no. 11: 3287. https://doi.org/10.3390/s26113287
APA StyleKremser, S., & Graffi, K. (2026). Evaluating the ESP32-S3 for Wi-Fi Penetration Testing Through the Development of Deauther32 and HackHeld32. Sensors, 26(11), 3287. https://doi.org/10.3390/s26113287

